Category: Politics

  • MIL-OSI Security: Chicago Man Convicted of Conspiring to Provide Material Support to Foreign Terrorist Organization

    Source: US FBI

    CHICAGO — A Chicago man was convicted in federal court today of conspiring to provide material support to the Islamic State of Iraq and al-Sham (ISIS) by using social media to encourage attacks on ISIS’s enemies and recruit new ISIS members.

    ASHRAF AL SAFOO was a leader of Khattab Media Foundation, a sophisticated online organization that swore allegiance to ISIS and created and disseminated threats and ISIS propaganda on social media and other online platforms.  Al Safoo and other members of Khattab created and posted pro-ISIS videos, articles, essays, and infographics at the direction of, and in coordination with, ISIS.  Much of Khattab’s propaganda promoted violent jihad on behalf of ISIS, which has been designated by the United States government as a foreign terrorist organization.  In one posting, Al Safoo encouraged Khattab members to post pro-ISIS information “to cause confusion and spread terror within the hearts of those who disbelieved.”  In another posting, Al Safoo wrote, “Work hard, brothers, edit the issue into short clips, take the pictures out of it and publish the efforts of your brothers in the pages of the apostates.  Participate in the war, and spread terror, the [Islamic] State does not want you to watch it only, rather, it incites you, and if you are unable to, use it to incite others.”

    Many of Khattab’s postings included images of violence, celebrations of terrorist attacks and mass shootings in the United States, and encouragement for “lone wolf” attacks in western countries.

    Al Safoo, 41, was arrested in Chicago in 2018.  After a bench trial in U.S. District Court in Chicago in 2025, U.S. District Judge John Robert Blakey today announced his verdicts, finding Al Safoo guilty of one count of conspiracy to provide material support to a foreign terrorist organization, one count of conspiracy to transmit threats in interstate commerce, one count of conspiracy to intentionally access a protected computer without authorization, four counts of intentionally accessing a protected computer without authorization, and four counts of providing material support to a foreign terrorist organization.

    The convictions carry a maximum sentence of 130 years in federal prison.  Judge Blakey set sentencing for Oct. 9, 2025.

    The convictions were announced by Andrew S. Boutros, United States Attorney for the Northern District of Illinois, John A. Eisenberg, Assistant Attorney General for National Security at the Department of Justice, and Douglas S. DePodesta, Special Agent-in-Charge of the Chicago Field Office of the FBI.  The government is represented by Assistant U.S. Attorneys Melody Wells, Barry Jonas, and Thomas P. Peabody of the Northern District of Illinois, and Trial Attorney Andrew J. Dixon of the National Security Division’s Counterterrorism Section.

    “Today’s conviction demonstrates that the safety and security of the American public is always a top priority for me and my entire Office,” said U.S. Attorney Boutros.  “The prosecution of Ashraf Al Safoo is a testament to the vigilance and dedication of our prosecutors and law enforcement partners who stand watch to disrupt and prevent dangerous threats before they materialize.  We will vigorously pursue and bring to justice those who provide material support–in whatever form–to terrorist organizations.”

    “The conviction of Al Safoo affirms the FBI’s strong commitment to protecting and defending the United States from anyone who seeks to harm our citizens,” said FBI Chicago SAC DePodesta.  “Those who willingly associate with terrorist organizations or support violent extremism will be investigated, disrupted, and held accountable.  It is thanks to the FBI Chicago Joint Terrorism Task Force and its partner agencies that our community is safe from those who pose a fundamental threat to our nation.”

    MIL Security OSI

  • MIL-OSI Analysis: Self determination theory: how to use it to boost wellbeing

    Source: The Conversation – UK – By Mark Fabian, Reader of Public Policy, University of Warwick

    Self-determination theory (SDT) is one of the most well established and powerful approaches to wellbeing in psychological research literature. Yet it doesn’t seem to have broken through into popular discussions about wellbeing, happiness and self-help. That’s a shame, because it has so much to contribute.

    A foundational idea in self-determination theory is that we have three basic psychological needs: for autonomy, competence and relatedness.

    Autonomy is the need to be in control of your own life rather than being controlled by others. Competence is the need to feel skilful at the tasks one values or needs to thrive. Relatedness refers to feeling loved and cared for, and a sense of belonging to a group that provides social support.

    If our basic psychological needs are met, then we are more likely to experience wellbeing. Symptoms include emotions such as joy, vitality and excitement because we’re doing the things we love, for example. We’ll probably have a sense of meaning and purpose because we live within a community whose culture we value.


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.


    Conversely, when our basic needs are thwarted we should see symptoms of illbeing. Anger, frustration and boredom grow when our behaviour is controlled by parents, bureaucrats, bosses or other forces that press our energies towards their ends instead of ours.

    Depression is liable when we our competence is overwhelmed by failure. And anxiety is often a social emotion that arises when we’re worried about whether our group cares for us.

    So we should cultivate our basic psychological needs – but how? You need to discover what you want to do with your life, what skills to become competent in, who to relate to and what communities to contribute to.

    Using motivation to find your way

    Here’s where the second foundational idea in SDT can be super helpful, as I explain in my new book, Beyond Happy: How to rethink happiness and find fulfilment. SDT proposes a motivational spectrum running from extrinsic at one end to intrinsic at the other. Finding out where you are on the spectrum for a certain activity or task can help you work out how to be happier.

    The more extrinsically motivated something is, the more self-regulation it requires. For example, when refugees flee their homes due to encroaching war, there is often a large part of them that wants to stay. Willpower is required to act. In contrast, intrinsically motivated behaviour springs spontaneously from us. You don’t need willpower to get stuck into your hobbies.

    Each type of motivation comes with different emotional signals and deciphering them can help us find what values, behaviour and groups suit us.

    The spectrum of motivation according to self-determination theory.
    CC BY-NC

    “Identified” motivation, for example, sits between extrinsic and intrinsic motivation. It occurs when we value an activity but don’t inherently enjoy it. That’s why success in identified behaviour is usually met with a feeling of accomplishment or the warm and fuzzy feeling you get when you do the right thing, like going a bit out of your way to put your rubbish in a bin.

    In contrast, “introjected” motivation is where you value something contingent to the behaviour itself. Many of us loathe the gym, for example, but we want to be healthy. A child might not want to practice the cello, but they do want their parent’s approval.

    Because introjection is relatively extrinsic, it requires willpower, and probably a bit more of it than for identified behaviour. Completion of an introjected activity is often met with relief rather than accomplishment and little desire to keep going.

    Sometimes things that are dependent on introjected behaviour can make us unhappy. In teen dramas, for example, the protagonist often does something because they want to be popular, but when they win the approval of the cool kids they realise those kids are mean and lame.

    Why money, power and status won’t make you happy

    If that’s how you feel, you’ve found something inauthentic to you. Then there’s very little chance the introjected activity will lead to your wellbeing. In fact, SDT has identified some common values. You’ll recognise them immediately: popularity, fame, status, power, wealth and success.

    They’re extrinsic because they’re not peculiar to you. If you get rich doing the thing you love, that’s great, but many of us never even think about what we love because we’re too busy thinking about how to get rich.

    Extrinsic pursuits are ultimately bad for our wellbeing because they’re all poor substitutes for basic psychological needs. When our autonomy is thwarted by strict parents or disciplinarian teachers, we crave power. When we don’t know what sort of life to build and thus what skills we need competence in, we adopt other people’s notions of success instead.

    Extrinsic pursuits often emerge from a wounded place and a defensive reaction. When we’re lonely or feel unloved for who we are, for example, we might compensate by seeking fame or popularity. We’ll start talking about our accomplishments on LinkedIn, for example.

    The problem is that the people this attracts don’t value you specifically, only your power, status or money. You sense that if you ever lost those things, you would lose these people too.

    SDT can help you learn to listen to your emotions and interpret your motivations instead, and use them to guide you towards the values, activities and people that are right for you.

    For example, if you feel joyful and fulfilled when you solve a complex puzzle, perhaps consider a career that involves that activity, such as law or engineering. If such puzzles feel like torture, that’s a signal too. Perhaps something more relational or intuitive, like social work, would work better.

    When you pursue things that are authentic to you it will nourish your sense of autonomy. You’ll build competence in those activities because they’re intrinsically motivated. And you’ll form deep relationships with the people you encounter because you genuinely like each other. Wellbeing will follow.

    Mark Fabian does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Self determination theory: how to use it to boost wellbeing – https://theconversation.com/self-determination-theory-how-to-use-it-to-boost-wellbeing-259829

    MIL OSI Analysis

  • MIL-OSI Analysis: Dune director Denis Villeneuve will helm the next Bond – but what will his 007 be like?

    Source: The Conversation – UK – By William Proctor, Associate Professor in Popular Culture, Bournemouth University

    Wiki Commons/Canva, CC BY-SA

    The James Bond franchise has lain dormant for four years, since Daniel Craig’s swansong as 007, No Time to Die. A legal quarrel between Bond’s producers, Michael G. Wilson and Barbara Broccoli, and Amazon Studios resulted in a stalemate and production on a new Bond film has remained in limbo.

    Nevertheless, speculation has been rife about which actor will next play Ian Fleming’s super-spy (the latest actor to be associated with the role is former Spider-man Tom Holland).

    When news surfaced in February 2025 that Amazon MGM (Amazon purchased MGM in 2021) had effectively become Bond’s new custodians, critics and audiences alike expressed concern – to put it lightly. Many feared that Jeff Bezos was more interested in stimulating Amazon Prime membership by driving multiple content streams through spin-offs and merchandising than protecting Fleming’s legacy.

    However, last week’s announcement that Denis Villeneuve has been appointed as the director of the 26th Bond film is a savvy move. It’s a declaration of intent that seeks to promote and market Amazon MGM as safe harbour for the Bond franchise.


    Looking for something good? Cut through the noise with a carefully curated selection of the latest releases, live events and exhibitions, straight to your inbox every fortnight, on Fridays. Sign up here.


    The announcement positions the next era of Bond as a prestigious exercise helmed by “a cinematic master”, not a journeyman director. Villeneuve was previously offered the opportunity to direct No Time to Die, but turned the role down because of his commitment to the Dune films.

    By appointing Villeneuve, Amazon has managed to radically shift the public debate. Villeneuve is “much more than a technical director”, wrote Guardian film critic Peter Bradshaw. “He is an alpha-grade auteur in the same league as Christopher Nolan.”

    Other critics have pointed to his rare ability to “combine blockbuster momentum (and ticket sales) with the finer, more nuanced sensibilities of a filmmaker always concerned with slowing down, honing in on character and theme”.

    Although Sam Mendes, director of Skyfall (2012) and Spectre (2015), came with artistic status, Villeneuve is something different – a marquee name frequently described as an auteur.

    Villeneuve talks about his love for Bond.

    Since his transition from making mostly low-key independent films in his native Canada to his arrival in Hollywood with Prisoners, starring Hugh Jackman and Jake Gyllenhaal (2013), Villeneuve has amassed an impressively eclectic filmography.

    He has proven that he is as comfortable shooting realistic crime thrillers (Sicario, 2015) and surrealist cinema that David Lynch would be proud of (Enemy, 2013), as he is with science fiction (Arrival, 2016, Blade Runner 2049, 2017, and the Dune films, 2021 and 2024).

    Villeneuve’s Bond

    Although Sicario may be the closest in terms of genre to the Bond films, establishing Villeneuve as a director who can expertly shoot action sequences, it is nevertheless difficult at this stage to conceptualise what a Villeneuve Bond film might be like.

    Some critics have suggested that the director’s cinematic resume, eclectic as it is, might not bode well for Bond. The Hollywood Reporter’s film critic Benjamin Svetkey, for instance, worries that Villeneuve’s “lugubrious, meditative filmmaking” is sorely lacking in humour – which could be fatal for 007. “A certain amount of wit and winking is critical to the character,” he claims.

    It is early days for Amazon MGM and Villeneuve. As yet, there is reportedly no treatment, no script, no writer and – more pointedly – no actor appointed to the role. Whatever happens, the 26th Bond film is likely to be a hard reboot that wipes the slate clean (again) after the fate of 007 in No Time to Die.

    Villeneuve’s choice for Bond is unlikely to be as cartoonish as Pierce Brosnan’s iteration.

    Although Villeneuve has said that he intends to honour tradition and that Bond is “sacred territory” for him, Bond’s capacity for revision and regeneration has been key to the franchise’s longevity.

    As socoiologists Tony Bennett and Janet Woollacott argue in their seminal study, Bond and Beyond, the figure of Bond has over the past six decades “been differently constructed at different moments,” with “different sets of ideological and cultural concerns”.

    So what kind of Bond film Villeneuve ends up directing largely depends on the story and whichever actor is anointed as the next James Bond. It is doubtful that audiences will expect a campy pantomime Bond like Roger Moore, or a Bond with an invisible car, like Pierce Brosnan in the cartoonish Die Another Day (2002). Villeneuve’s choice of Casino Royale as his favourite 007 may provide a clue. But it is also unlikely that the director will be satisfied with slavishly repeating the past.

    William Proctor does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. Dune director Denis Villeneuve will helm the next Bond – but what will his 007 be like? – https://theconversation.com/dune-director-denis-villeneuve-will-helm-the-next-bond-but-what-will-his-007-be-like-260140

    MIL OSI Analysis

  • Jaishankar urges Quad partners to back India’s zero tolerance policy on terror

    Source: Government of India

    Source: Government of India (4)

    External Affairs Minister (EAM) S. Jaishankar on Tuesday reiterated India’s right to defend itself against terrorism and urged the Quad to understand this position, as the foreign ministers of the four-nation group gathered for their ministerial meeting.

    “India has every right to defend its people against terrorism, and we will exercise that right,” he said, with U.S. Secretary of State Marco Rubio, Australian Foreign Minister Penny Wong, and Japanese Foreign Minister Takeshi Iwaya standing beside him.

    “We expect our Quad partners to understand and appreciate that,” he emphasised.

    This marks the first Quad ministerial where the four foreign ministers are meeting together following the heinous Pahalgam massacre on April 22, carried out by Pakistan-backed terrorists, and India’s subsequent decisive response — ‘Operation Sindoor’.

    Referring to the Pahalgam attack, EAM Jaishankar said, “A word about terrorism in light of our recent experience: The world must display zero tolerance. Victims and perpetrators must never be equated.”

    Counter-terrorism remains a core focus of the Quad agenda.

    Prime Minister Narendra Modi is set to host the Quad leaders’ summit later this year, which will include U.S. President Donald Trump, Australian Prime Minister Anthony Albanese, and Japanese Prime Minister Shigeru Ishiba.

    “We have some proposals on how to make that summit productive,” Jaishankar said. “I’m sure our partners do as well. We will discuss them, and I’m confident we can agree on a constructive way forward.”

    “A lot is happening in the world, and I’m sure that our exchange of views will be very valuable for all of us,” he added.

    He underlined that the Quad is committed to a rules-based international order, stating, “It is essential that nations of the Indo-Pacific have the freedom of choice — a prerequisite for making the right decisions.”

    The task before the Quad, he said, is “deepening our convergence and expanding our common ground.”

    “In recent months, we have made significant progress in various Quad initiatives,” he said.

    “These include areas like the maritime domain, technology, education, and political coordination.”

    Regarding their current meeting, he added, “We will also be discussing how the functioning of the Quad has been enhanced by streamlining working groups into a more cohesive, nimble, and focused structure.”

    “I value our consultations on various dimensions of the Indo-Pacific,” he concluded.

    — IANS

  • MIL-OSI United Kingdom: Play! Memorial Park tennis courts back in use after revamp

    Source: City of Canterbury

    Just as Wimbledon is underway, we have now completed a fantastic revamp of the tennis courts in Herne Bay Memorial Park.

    Four of the eight courts have been completely resurfaced, with the other four thoroughly cleaned and resprayed. All eight now sport the classic tennis blue and green colours.

    In addition, they all have new posts and nets, and one of the courts has pickleball line markings as well as tennis markings.

    These courts will remain free of charge to use and no booking is required.

    Cabinet member for open spaces, Cllr Mel Dawkins (pictured left, above), joined Lord Mayor Cllr Keji Moses and Heron ward councillor David Thomas for an inspection and the chance to hit a few shots.

    Cllr Dawkins said: “The courts look absolutely ‘ace’ and we are sure they are going to prove to be a ‘smash’ in the town.

    “It’s a job really well done and thanks go to the council officers who have run this project and our contractor ETC Sports Surfaces for such professional work.”

    The revamp cost £70,000 and was paid for using section 106 planning contributions from developers.

    We are also keen to develop a ‘Friends of…’ group for the courts to encourage activity and help to report any issues.

    Anyone interested in getting involved should email Leisure Development Officer Giles Seaford at giles.seaford@canterbury.gov.uk.

    Published: 1 July 2025

    MIL OSI United Kingdom

  • MIL-OSI USA: Attorney General Bonta Sues Trump Administration for Illegally Sharing Californians’ Personal Health Data with ICE

    Source: US State of California

    OAKLAND – California Attorney General Rob Bonta today, leading a multistate coalition, is filing a lawsuit challenging the U.S. Department of Health and Human Services’ (HHS) decision to provide unfettered access to individual personal health data to the Department of Homeland Security (DHS), which houses Immigration and Customs Enforcement (ICE). In the seven decades since Congress enacted the Medicaid Act to provide medical assistance to vulnerable populations, federal law, policy, and practice has been clear: the personal healthcare data collected about beneficiaries of the program is confidential, to be shared only in certain narrow circumstances that benefit public health and the integrity of the Medicaid program itself. In today’s lawsuit filed in the U.S. District Court for the Northern District of California, Attorney General Bonta and the coalition argue that the mass transfer of this data violates the law and ask the court to block any new transfer or use of this data for immigration enforcement purposes. 

    “The Trump Administration has upended longstanding privacy protections with its decision to illegally share sensitive, personal health data with ICE. In doing so, it has created a culture of fear that will lead to fewer people seeking vital emergency medical care,” said Attorney General Bonta. “I’m sickened by this latest salvo in the President’s anti-immigrant campaign. We’re headed to court to prevent any further sharing of Medicaid data — and to ensure any of the data that’s already been shared is not used for immigration enforcement purposes.”

    Created in 1965, Medicaid is an essential source of health insurance for lower-income individuals and particular underserved population groups, including children, pregnant women, individuals with disabilities, and seniors. The Medicaid program allows each participating state to develop and administer its own unique health plans; states must meet threshold federal statutory criteria, but they can tailor their plans’ eligibility standards and coverage options to residents’ needs. As of January 2025, 78.4 million people were enrolled in Medicaid and the Children’s Health Insurance Program (CHIP) nationwide.  

    California’s Medi-Cal program provides healthcare coverage for one out of every three Californians, including more than two million noncitizens. Noncitizens include green card holders, refugees, individuals who hold temporary protected status, Deferred Action for Childhood Arrival recipients, and others. Not all noncitizens are eligible for federally funded Medi-Cal services, and so California uses state-only funds to provide a version of the Medi-Cal program to all eligible state residents, regardless of their immigration status. 

    A certain amount of personal data is routinely exchanged between the states and the federal government for purposes of administering Medicaid, including verifying eligibility for federal funding. Historically, DHS has acknowledged that the Medicaid Act and other federal healthcare authorities foreclose the use of Medicaid personal information for immigration enforcement purposes. Yet now, the federal government appears to have — without formal acknowledgment — adopted a new policy that allows for the wholesale disclosure and use of state residents’ personal Medicaid data for purposes unrelated to Medicaid program administration. On June 13, 2025, California and other states learned through news reports that HHS has transferred en masse their state’s Medicaid data files, containing personal health records representing millions of individuals, to DHS. Reports indicate that the federal government plans to create a sweeping database for “mass deportations” and other large-scale immigration enforcement purposes.

    The federal government claims it gave this data to DHS “to ensure that Medicaid benefits are reserved for individuals who are lawfully entitled to receive them.” But it is Congress that extended coverage and federal funds for emergency Medicaid to all individuals residing in the United States, regardless of immigration status. The states have and will continue to cooperate with federal oversight activities to ensure that the federal government pays only for those Medicaid services that are legally authorized.  

    In today’s lawsuit, Attorney General Bonta and the coalition highlight that the Trump Administration’s illegal actions are creating fear and confusion that will lead noncitizens and their family members to disenroll, or refuse to enroll, in emergency Medicaid for which they are otherwise eligible, leaving states and their safety net hospitals to foot the bill for federally mandated emergency healthcare services.  They may not get the emergency health services they need and will suffer negative health consequences — and even death — as a result. The coalition asks that the court find the Trump Administration’s actions arbitrary and capricious and rulemaking without proper procedure in violation of the Administrative Procedure Act, contrary to the Social Security Act, Health Insurance Portability and Accountability Act (HIPAA), Federal Information Security Modernization Act, and Privacy Act, and in violation of the Spending Clause. They ask the court to enjoin HHS from transferring personally identifiable Medicaid data to DHS or any other federal agency and DHS from using this data to conduct immigration enforcement.  

    Attorney General Bonta leads the attorneys general of Arizona, Colorado, Connecticut, Delaware, Hawaii, Illinois, Massachusetts, Maine, Maryland, Michigan, Minnesota, Nevada, New Jersey, New Mexico, New York, Oregon, Rhode Island, Vermont, and Washinton in filing the lawsuit. 

    A copy of the lawsuit will be posted online here when available.

    MIL OSI USA News

  • MIL-OSI USA: Justice Department Charges Two Individuals with Acting as Agents of the PRC Government

    Source: US State of California

    Arrests Disrupted Clandestine PRC Ministry of State Security Intelligence Network Operating in the United States

    Two nationals of the People’s Republic of China (PRC) made their initial appearances in federal court in Portland, Oregon, and Houston, Texas, yesterday to face charges issued out of the Northern District of California for acting as agents of the Government of the PRC without prior notification to the Attorney General. The defendants, Yuance Chen, 38, a PRC national and legal permanent resident who resides in Happy Valley, Oregon, and Liren “Ryan” Lai, 39, a PRC national who traveled from the PRC to Houston, Texas, on a tourist visa in April 2025, were arrested Friday on a criminal complaint charging them with overseeing and carrying out various clandestine intelligence taskings in the United States on behalf of the PRC Government’s principal foreign intelligence service, the Ministry of State Security (MSS). These activities included facilitating a “dead drop” payment of cash for information relating to the national security of the United States previously provided to the MSS, gathering intelligence about U.S. Navy service members and bases, and assisting with efforts to recruit other individuals from within the U.S. military as potential MSS assets.

    Chen and Lai were arrested on June 27, 2025, by the FBI in Happy Valley, Oregon, and Houston Texas, as part of a coordinated counterintelligence and law enforcement operation across multiple states.

    “This case underscores the Chinese government’s sustained and aggressive effort to infiltrate our military and undermine our national security from within,” said Attorney General Pamela Bondi. “The Justice Department will not stand by while hostile nations embed spies in our country – we will expose foreign operatives, hold their agents to account, and protect the American people from covert threats to our national security.”

    “The FBI arrested two Chinese nationals who were allegedly attempting to recruit U.S. military service members on behalf of the PRC,” said FBI Director Kash Patel. “The Chinese Communist Party thought they were getting away with their scheme to operate on U.S. soil, utilizing spy craft, like dead drops, to pay their sources. This case was a complex, coordinated effort and is an example of outstanding counterintelligence work done by FBI San Francisco, Portland, Houston, San Diego, and the Counterintelligence Division. The FBI will continue to vigilantly defend the homeland from China’s pervasive attempts to infiltrate our borders.”

    “Adverse foreign intelligence services like the PRC’s Ministry of State Security dedicate years to recruiting individuals and cultivating them as intelligence assets to do their bidding within the United States,” said Assistant Attorney General for National Security John A. Eisenberg. “Under my leadership, the National Security Division will continue to defend our nation and neutralize our adversaries’ clandestine spy networks.”

    “These charges reflect the breadth of the efforts by our foreign adversaries to target the United States — this time by conducting illegal intelligence-gathering operations aimed at our national security information and military service members,” said U.S. Attorney Craig H. Missakian for the Northern District of California. “My office and the FBI remain ever vigilant in guarding against these threats to the United States. We will continue to undertake counterespionage investigations and prosecutions, no matter how complex and sensitive, to disrupt attempts to weaken our national security.”

    As alleged in the criminal complaint unsealed yesterday, the PRC Government conducts intelligence activities against the United States through multiple arms, including the MSS. The MSS handles civilian intelligence collection for the PRC and is responsible for counterintelligence and foreign intelligence, as well as political security. The MSS and its bureaus seek to obtain information on political, economic, and security policies that might affect the PRC, along with military, scientific, and technical information of value to the PRC. The MSS and its bureaus are tasked with conducting clandestine and covert human source operations, of which the United States is a principal target.

    As alleged in the criminal complaint, Lai recruited Chen to work on behalf of the MSS in or about 2021. While in Guangzhou, China, in January 2022, Lai and Chen worked together to facilitate a dead-drop payment of at least $10,000 on behalf of the MSS, working with other individuals located in the United States to leave a backpack with the cash at a day-use locker at a recreational facility located in Livermore, California.

    Following the January 2022 dead drop, Lai and Chen continued to work on behalf of the MSS, including to help identify potential assets for MSS recruitment within the ranks of the U.S. Navy. For example, beginning in 2022, Chen was tasked by Lai and other agents of the MSS to contact a Navy employee over social media, and then later, in 2025, arranged for a tour with the employee of the USS Abraham Lincoln and provided information about the employee to the MSS. In 2022 and 2023, Chen was tasked to visit a U.S. Naval installation in Washington State and a U.S. Navy recruitment center in San Gabriel, California. While in the recruitment center, Chen obtained photographs of a bulletin board containing the names, programs, and hometowns of recent Navy recruits, the majority of whom listed their hometown as “China,” which he appears to have transmitted to an MSS intelligence officer in China. The complaint also alleges that Chen received instruction from the MSS on what to say to potential recruits regarding potential payment that could be made by the MSS, preferred Naval job assignments for potential recruits, and methods for minimizing Chen’s risk of exposure. The complaint alleges that in 2023, Lai flew to the United States from the PRC and provided Chen with a cellphone that Chen then used to communicate with the MSS. The complaint also alleges that Chen traveled to Guangzhou and met with MSS intelligence officers in April 2024 and March 2025 in order to discuss compensation and specific taskings.

    The complaint also alleges that Lai traveled to Houston, Texas, in April 2025, claiming that the purpose of his visit was related to his business as an online retail seller, and that he would be staying in the Houston area for two weeks. However, on May 9, 2025 – more than four weeks after his arrival in the United States – Lai traveled by car with a companion from Houston to Southern California, via New Mexico and Tucson, Arizona, before returning to Texas, on May 15, 2025.

    Chen and Lai are charged with violating Title 18, United States Code, Section 951, which makes it a crime for a person to operate or agree to operate within the United States as an agent of a foreign government without notification to the Attorney General of the United States. If convicted, the defendants face a fine of up to $250,000 and a term of imprisonment of up to 10 years.

    The FBI San Francisco Field Office is leading the investigation, with valuable assistance provided by the FBI Portland, Houston, and San Diego Field Offices. The Naval Criminal Investigative Service (NCIS) also provided valuable assistance during the operation. 

    The National Security and Special Prosecutions Section of the U.S. Attorney’s Office for the Northern District of California and the National Security Division’s Counterintelligence and Export Control Section are in charge of the prosecution. Significant operational support and assistance is also being provided by the District of Oregon, the Southern District of Texas, and the Southern District of California.

    A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI: WinnerMining: Are cryptocurrency fluctuations making people panic? No, it’s the business opportunities of cloud mining.

    Source: GlobeNewswire (MIL-OSI)

    New York City, July 01, 2025 (GLOBE NEWSWIRE) — Against the backdrop of drastic fluctuations in the global economy, cryptocurrencies have become the “number one” investment asset pursued by global investors. In particular, BTC, ETH, and XRP continue to influence the global cryptocurrency market. However, AQUARONE, Steffan Luke, CEO of WinnerMining Co., Ltd., believes that amid the market fluctuations that everyone is worried about, there are business opportunities that cannot be missed.

    “Volatility” turns into business opportunities
    WinnerMining not only prevents market volatility, but also stimulates more active trading. WinnerMining offers a variety of different investment contracts for investors of all levels, allowing them to make investment decisions with confidence.
    Despite the uncertainty of US policies under President Trump, which may affect global cryptocurrencies, WinnerMining can cope with the challenges that may arise in the second half of the year and maintain its leading position in the international cryptocurrency market.
    “WinnerMining has experienced crises, whether it is COVID-19 that disrupts the world, US taxation, or regional political conflicts, and each time it has been able to manage in a professional manner and has good resources and connections in the global crypto market, so our customers will still be taken care of in the best way without being affected by irregular market behavior.”

    What are the advantages of Winnermining?
    1. Fund security: The biggest concern of any investor is fund security. There is no need to worry about it at Winnermining, because Winnermining adopts military-grade double protection and stores funds in cold wallets and the world’s top 10 authoritative banks. And it can protect users from asset loss or inflation problems between conflicts.

    2. Registration bonus: In order to welcome novices or experienced miners who join Winnermining for the first time, as long as they join Winnermining, they will immediately receive a platform reward of $15.

    3. Multiple choices: Provide more than 10 different levels of contracts, suitable for users of any class, and also support free cloud mining!

    4. Flexible participation: Support global users to invest in popular currencies such as BTC, ETH, XRP, SOL, DOGE, USDT, USDC, LTC, BCH, etc.

    5. Maintain sustainability: Winnermining has more than 100 large and small new energy power generation sites around the world to maintain the development of cloud mining and continue the mining process.

    6. Customer Support: We provide 24-hour online customer service. Users can visit and consult at any time in any region. Adhering to the concept that customers are God, we serve users from all over the world wholeheartedly and let users have the experience of first love.

    How to participate in Winnermining?
    Step 1: Visit the official website, fill in your email address and set your username/password to complete the registration.
    Step 2: Select the appropriate contract to purchase and lease (all lease contracts can refund the principal).
    Step 3: After the purchase is completed, no operation is required, just wait for 24 hours to get daily income.

    How to earn income on Winnermining?
    Users can complete registration on the official website or application and purchase contracts on the platform.
    Some equity contracts of WinnerMining in 2025 can be viewed here:
    I- Antminer S17e: Investment amount of $100, total profit of $100 + $8.
    II – Shenma Miner M30S: Investment amount of $1000, total profit of $1000 + $130.
    III – Antminer S19J Pro: Investment amount of $3000, total profit of $3000 + $675.
    IV- AvalonMiner A1346: Investment amount of $5000, total profit of $5000 + $1600.
    V – Desiwe Miner K10Ultra: Investment amount of $30,000, total profit of $30,000 + $24300.
    VI – Rack-mounted Filecoin Miner 4300TiB S: Investment amount of $100,000, total profit of $100,000 + $92,500.
    (Visit WinnerMining.VIP to view more contracts)

    Overview:
    Winnermining knows that in the ever-changing crypto market, no one can stand still. The fluctuating crypto market has bubbles and opportunities, and participating in WinnerMining cloud mining is a good choice for digital growth. Join now and get a $15 reward without applying.
    —— Click to download the APP to participate in WinnerMining to take you to experience the daily growth progress of digital assets.

    Attachment

    The MIL Network

  • MIL-OSI Africa: Minister of Foreign Affairs of Belarus M.Ryzhenkov holds negotiations with the Minister of International Relations of Botswana


    Download logo

    On July 1, 2025 the Minister of Foreign Affairs of the Republic of Belarus, Maxim Ryzhenkov, held a meeting with the Minister of International Relations of the Republic of Botswana, Phenyo Butale, who is paying an official visit to Belarus.

    This is the first visit by the head of Botswana’s foreign ministry to our country in the history of Belarusian-Botswana relations.

    During the meeting, the parties discussed ways to strengthen political and interministerial dialogue, expand mutual trade, cooperation in the fields of agriculture and food security, healthcare, education, and the formation of a legal framework.

    The parties reaffirmed their commitment to coordinate on all aspects of the bilateral and international agenda.

    The ministers agreed on practical steps to intensify cooperation and confirmed their mutual interest in holding a series of bilateral events in 2025–2026.

    Following the negotiations, a joint statement was signed by the foreign ministers of Belarus and Botswana, expressing their intention to strengthen multifaceted cooperation.

    Distributed by APO Group on behalf of Ministry of Foreign Affairs of the Republic of Belarus.

    MIL OSI Africa

  • MIL-OSI Russia: Kazakhstan Plays Key Role in China-Central Asia Partnership – Chinese Consul General in Almaty

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    Almaty, July 1 (Xinhua) — In an exclusive article for DKnews.kz, Chinese Consul General in Almaty Jiang Wei shared her views on the historic 2nd China-Central Asia Summit in Astana, where the leaders of the six countries opened a new page in centuries-old cooperation. She stressed that Kazakhstan continues to play a key role in deepening Central Asia’s strategic partnership with China.

    As the Consul General noted, an unprecedented level of political mutual trust has been achieved between the parties. According to her, after establishing diplomatic relations, China and the Central Asian countries have built a comprehensive strategic partnership, secured it with numerous documents within the framework of the Belt and Road initiative, and are promoting the concept of a community with a common destiny both at the bilateral and regional levels.

    The Astana Declaration became a symbol of political unity, the diplomat said, adding that in it the parties confirmed their readiness to support each other on key issues, and the declaration itself became a powerful expression of political consensus and a signal of stability in conditions of global uncertainty.

    Jiang Wei also stressed that China and Central Asian countries have achieved impressive results in practical cooperation. “The summit announced that 2025-2026 will be the Years of High-Quality Development of China-Central Asia Cooperation, focusing on six priority areas, such as unimpeded trade, industrial investment, connectivity, green resource management, agricultural modernization, and facilitating people-to-people exchanges,” the consul general noted.

    Speaking about the Action Plan for the high-quality joint construction of the Belt and Road signed by the heads of six states, she noted that this is the first time that China has signed such a document with all the countries in the border region at once.

    “The summit also decided to establish a poverty alleviation center, an educational exchange and cooperation center, a desertification control center, and a platform to create favorable conditions for trade within the China-Central Asia format. These initiatives are aimed at improving the well-being of the Central Asian population, training highly qualified specialists, managing water and natural resources, and promoting high-quality economic development. All this clearly demonstrates the deep meaning of the slogan “promoting joint modernization through high-quality development,” Jiang Wei emphasized.

    The Consul General said that the summit demonstrated a new level of good-neighborliness and friendship. Speaking about the Treaty on Eternal Good-Neighborliness, Friendship and Cooperation signed by the six parties, a document that legally enshrines the principle of eternal friendship between peoples, she said: “This agreement has become a new milestone in the history of Chinese-Central Asian relations, opening the way for cooperation for decades to come.”

    “More than 100 agreements on sister cities were signed, which forms a solid humanitarian basis for people’s diplomacy. These “bridges of friendship” contribute to the expansion of cultural and humanitarian interaction. The parties also agreed to intensify cooperation in such areas as parliamentary and inter-party ties, contacts between women and youth, the work of the media, analytical centers and public organizations,” the consul general added. “All this will become a new impetus for the dialogue of civilizations and a continuation of the thousand-year tradition of friendship between peoples,” she emphasized.

    In addition, as the diplomat reported, following the summit, more than 60 bilateral agreements were signed, covering such areas as trade, investment, science and technology, customs regulation, tourism, and the media. These agreements, in her opinion, will give a powerful impetus to further deepening ties between the parties in the “golden period.” –0–

    MIL OSI Russia News

  • MIL-OSI USA: House Republican Leadership Statement on Senate Passage of the One Big Beautiful Bill

    Source: US House of Representatives Republicans

    The following text contains opinion that is not, or not necessarily, that of MIL-OSI –

    WASHINGTON—Speaker Johnson, Leader Scalise, Whip Emmer, and Chairwoman McClain released the following joint statement after the Senate’s passage of the One Big Beautiful Bill. The House will consider the bill immediately for final passage and put it on President Trump’s desk by the Fourth of July.

    “The House will work quickly to pass the One Big Beautiful Bill that enacts President Trump’s full America First agenda by the Fourth of July. The American people gave us a clear mandate, and after four years of Democrat failure, we intend to deliver without delay.

    “Republicans were elected to do exactly what this bill achieves: secure the border, make tax cuts permanent, unleash American energy dominance, restore peace through strength, cut wasteful spending, and return to a government that puts Americans first.

    “This bill is President Trump’s agenda, and we are making it law. House Republicans are ready to finish the job and put the One Big Beautiful Bill on President Trump’s desk in time for Independence Day.”

    MIL OSI USA News

  • MIL-OSI Security: Justice Department Charges Two Individuals with Acting as Agents of the PRC Government

    Source: United States Attorneys General 7

    Arrests Disrupted Clandestine PRC Ministry of State Security Intelligence Network Operating in the United States

    Two nationals of the People’s Republic of China (PRC) made their initial appearances in federal court in Portland, Oregon, and Houston, Texas, yesterday to face charges issued out of the Northern District of California for acting as agents of the Government of the PRC without prior notification to the Attorney General. The defendants, Yuance Chen, 38, a PRC national and legal permanent resident who resides in Happy Valley, Oregon, and Liren “Ryan” Lai, 39, a PRC national who traveled from the PRC to Houston, Texas, on a tourist visa in April 2025, were arrested Friday on a criminal complaint charging them with overseeing and carrying out various clandestine intelligence taskings in the United States on behalf of the PRC Government’s principal foreign intelligence service, the Ministry of State Security (MSS). These activities included facilitating a “dead drop” payment of cash for information relating to the national security of the United States previously provided to the MSS, gathering intelligence about U.S. Navy service members and bases, and assisting with efforts to recruit other individuals from within the U.S. military as potential MSS assets.

    Chen and Lai were arrested on June 27, 2025, by the FBI in Happy Valley, Oregon, and Houston Texas, as part of a coordinated counterintelligence and law enforcement operation across multiple states.

    “This case underscores the Chinese government’s sustained and aggressive effort to infiltrate our military and undermine our national security from within,” said Attorney General Pamela Bondi. “The Justice Department will not stand by while hostile nations embed spies in our country – we will expose foreign operatives, hold their agents to account, and protect the American people from covert threats to our national security.”

    “The FBI arrested two Chinese nationals who were allegedly attempting to recruit U.S. military service members on behalf of the PRC,” said FBI Director Kash Patel. “The Chinese Communist Party thought they were getting away with their scheme to operate on U.S. soil, utilizing spy craft, like dead drops, to pay their sources. This case was a complex, coordinated effort and is an example of outstanding counterintelligence work done by FBI San Francisco, Portland, Houston, San Diego, and the Counterintelligence Division. The FBI will continue to vigilantly defend the homeland from China’s pervasive attempts to infiltrate our borders.”

    “Adverse foreign intelligence services like the PRC’s Ministry of State Security dedicate years to recruiting individuals and cultivating them as intelligence assets to do their bidding within the United States,” said Assistant Attorney General for National Security John A. Eisenberg. “Under my leadership, the National Security Division will continue to defend our nation and neutralize our adversaries’ clandestine spy networks.”

    “These charges reflect the breadth of the efforts by our foreign adversaries to target the United States — this time by conducting illegal intelligence-gathering operations aimed at our national security information and military service members,” said U.S. Attorney Craig H. Missakian for the Northern District of California. “My office and the FBI remain ever vigilant in guarding against these threats to the United States. We will continue to undertake counterespionage investigations and prosecutions, no matter how complex and sensitive, to disrupt attempts to weaken our national security.”

    As alleged in the criminal complaint unsealed yesterday, the PRC Government conducts intelligence activities against the United States through multiple arms, including the MSS. The MSS handles civilian intelligence collection for the PRC and is responsible for counterintelligence and foreign intelligence, as well as political security. The MSS and its bureaus seek to obtain information on political, economic, and security policies that might affect the PRC, along with military, scientific, and technical information of value to the PRC. The MSS and its bureaus are tasked with conducting clandestine and covert human source operations, of which the United States is a principal target.

    As alleged in the criminal complaint, Lai recruited Chen to work on behalf of the MSS in or about 2021. While in Guangzhou, China, in January 2022, Lai and Chen worked together to facilitate a dead-drop payment of at least $10,000 on behalf of the MSS, working with other individuals located in the United States to leave a backpack with the cash at a day-use locker at a recreational facility located in Livermore, California.

    Following the January 2022 dead drop, Lai and Chen continued to work on behalf of the MSS, including to help identify potential assets for MSS recruitment within the ranks of the U.S. Navy. For example, beginning in 2022, Chen was tasked by Lai and other agents of the MSS to contact a Navy employee over social media, and then later, in 2025, arranged for a tour with the employee of the USS Abraham Lincoln and provided information about the employee to the MSS. In 2022 and 2023, Chen was tasked to visit a U.S. Naval installation in Washington State and a U.S. Navy recruitment center in San Gabriel, California. While in the recruitment center, Chen obtained photographs of a bulletin board containing the names, programs, and hometowns of recent Navy recruits, the majority of whom listed their hometown as “China,” which he appears to have transmitted to an MSS intelligence officer in China. The complaint also alleges that Chen received instruction from the MSS on what to say to potential recruits regarding potential payment that could be made by the MSS, preferred Naval job assignments for potential recruits, and methods for minimizing Chen’s risk of exposure. The complaint alleges that in 2023, Lai flew to the United States from the PRC and provided Chen with a cellphone that Chen then used to communicate with the MSS. The complaint also alleges that Chen traveled to Guangzhou and met with MSS intelligence officers in April 2024 and March 2025 in order to discuss compensation and specific taskings.

    The complaint also alleges that Lai traveled to Houston, Texas, in April 2025, claiming that the purpose of his visit was related to his business as an online retail seller, and that he would be staying in the Houston area for two weeks. However, on May 9, 2025 – more than four weeks after his arrival in the United States – Lai traveled by car with a companion from Houston to Southern California, via New Mexico and Tucson, Arizona, before returning to Texas, on May 15, 2025.

    Chen and Lai are charged with violating Title 18, United States Code, Section 951, which makes it a crime for a person to operate or agree to operate within the United States as an agent of a foreign government without notification to the Attorney General of the United States. If convicted, the defendants face a fine of up to $250,000 and a term of imprisonment of up to 10 years.

    The FBI San Francisco Field Office is leading the investigation, with valuable assistance provided by the FBI Portland, Houston, and San Diego Field Offices. The Naval Criminal Investigative Service (NCIS) also provided valuable assistance during the operation. 

    The National Security and Special Prosecutions Section of the U.S. Attorney’s Office for the Northern District of California and the National Security Division’s Counterintelligence and Export Control Section are in charge of the prosecution. Significant operational support and assistance is also being provided by the District of Oregon, the Southern District of Texas, and the Southern District of California.

    A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Global: Where does the UK most need more public EV chargers?

    Source: The Conversation – UK – By Labib Azzouz, Research Associate in Transport and Energy Innovation, University of Oxford

    Electric vehicle chargers at a motorway service station in Grantham, England. Angus Reid/Shutterstock

    The automotive and EV industry has repeatedly insisted that the UK needs more electric vehicle (EV) chargers to help motorists make the switch from conventional fossil-fuel burning cars.

    The Labour government has announced £400 million to install EV chargers, mainly on streets in poorer residential neighbourhoods, in place of the Conservative’s £950 million rapid charging fund that was directed at installing chargers in motorway service stations.

    Does it matter where these chargers are – and who pays to build them?

    The short answer is yes, it does matter. Our research conducted at motorway and local EV charging stations across England – including those located in residential areas, high streets and community centres – indicates that these two types of infrastructure serve distinct groups of users and fulfil different purposes.

    Suggesting that one can substitute for the other risks sending mixed signals to both the industry and the driving public.

    We found that motorway charging stations tend to cater to wealthier men, who are more likely to own premium EVs with long-range batteries and better performance. Many of these drivers have access to home chargers, so their use of public chargers is only for occasional, long-distance travel for business, leisure, or holidays – trips that require chargers along motorways.

    Convenience and charging speed are often more important than the price of public charging, particularly when the travel costs of these drivers are covered by their employers.

    Local public charging stations, on the other hand, serve more diverse groups. These include drivers from lower-income households who are more likely to own older and smaller EVs with shorter ranges. Access to home charging is often limited, especially for people living in flats or urban areas without driveways, garages or off-street parking.

    Not everyone can plug in at home.
    Andersen EV/Shutterstock

    Local chargers are also vital for taxi and delivery drivers who depend on their vehicles for work and make frequent short trips throughout the day. There are many professional drivers without access to workplace charging stations who need alternative local provision – something the Conservative government recognised in its 2022 EV charging strategy.

    Ultimately, the transition to EVs should take a balanced approach that carefully considers social equity, economic viability and environmental impact.

    Different locations serve different drivers

    Motorway charging stations are commercially attractive to private investors, such as energy companies, specialist charging providers and car manufacturers, despite their higher upfront costs and complex requirements.

    This is because service stations offer greater short-term revenue due to their ability to set premium prices. This is a result of there being limited alternatives and high demand for rapid charging, especially among long-distance travellers, and the willingness of EV drivers to pay for speed and convenience – unlike in more price-sensitive neighbourhood settings.

    Unsurprisingly, the government found that the rapid deployment of motorway chargers in recent years has been largely driven by the private sector. Our research highlighted that these revenues could be enhanced by a broader range of retail, dining and relaxation amenities, turning the time waiting for a car to charge into a more productive and pleasurable experience.

    Residential charging stations may not offer high profits per charge, but they typically require lower capital investment and benefit from consistent and predictable use. They are also suited to measures for reducing strain on the grid and balancing energy supply and demand.

    These measures include tariffs that make it cheaper to charge EVs during off-peak hours, or technology that allows cars to feed electricity stored in batteries back into the grid. These features make them appropriate for public funding, where return on investment is measured not just in profit but in value for the public.

    Considering that local EV charging serves those who do not have access to home charging and who drive for a living, the case for public funding is even stronger. These sorts of chargers make switching to an EV easier for different groups.

    For example, safe and carefully placed public chargers could help more women switch to EVs – although our research suggests that, while “careful placement” might refer to residential areas, it doesn’t necessarily mean on streets. Well-lit car parks and community destinations are sometimes considered safer options.

    Charging points outside a community centre in the Outer Hebrides, Scotland.
    AlanMorris/Shutterstock

    By helping EV drivers make frequent short trips, local chargers can also significantly reduce urban air pollution, emissions and noise, contributing to more liveable, healthier cities.

    That said, motorway charging stations and those near key transport corridors still play a crucial role in a comprehensive national network, and public funding may be required in more peripheral and rural areas of the UK where installations lag and commercial interest is limited.

    While long-distance trips are less frequent than short ones, they account for a disproportionately large share of energy use and emissions. Switching such trips to electric will be essential to reaching net zero goals.

    It seems reasonable to prioritise public investment in local EV charging infrastructure to support a fairer EV transition, but this should not be limited to on-street chargers. Investment is needed in residential and non-residential areas, public car parks, community centres and workplaces.

    Different types of EV charging are not interchangeable – all are needed to support the switch.


    Don’t have time to read about climate change as much as you’d like?

    Get a weekly roundup in your inbox instead. Every Wednesday, The Conversation’s environment editor writes Imagine, a short email that goes a little deeper into just one climate issue. Join the 45,000+ readers who’ve subscribed so far.


    Labib Azzouz has received funding from the UK Research and Innovation via the UK Energy Research Centre and Innovate UK as part of the Energy Superhub Oxford (ESO) project.

    Hannah Budnitz receives government funding from UK Research and Innovation grants via the Economic and Social Research Council and the Engineering and Physical Sciences Research Council. She has also previously received funding from Innovate UK and the Department for Transport.

    ref. Where does the UK most need more public EV chargers? – https://theconversation.com/where-does-the-uk-most-need-more-public-ev-chargers-259623

    MIL OSI – Global Reports

  • MIL-OSI Global: The Bear season 4: this meaty restaurant drama is still an enticing bingeable prospect

    Source: The Conversation – UK – By Jane Steventon, Course Leader, BA (Hons) Screenwriting; Deputy Course Leader & Senior Lecturer, BA (Hons) Film Production, University of Portsmouth

    Take a soupçon of identity crisis, a pinch of perfectionism, a scoop of burnout and mix thoroughly with a large measure of fraternal grief and sear over a hot grill and voilà! You have The Bear, a perfectly blended drama about a chef on the edge, driven by relentless ambition and exacting standards as he turns his family’s humble sandwich shop into a fine-dining restaurant.

    This intoxicating family drama was eaten up by critics and audiences alike in 2022, its first season garnering a rare perfect 100% score on Rotten Tomatoes, the subsequent two reaching scores of 99% and 89% respectively. It’s certainly a hard act to follow for season four.

    The first ten minutes of The Bear’s pilot episode thrillingly defined what was to come in high-octane style and scene-setting detail. The first season delivered a clever mix of authentic dialogue and setting, relatable family dysfunction and dynamic production style.

    Showstopping scenes of stressful kitchen heat were served up alongside a delectable range of new and established talent in the form of Jeremy Allen White (Carmy), Ebon Moss-Bachrach (Richie), Ayo Edebiri (Sydney) and Oliver Platt (Cicero/Uncle Jimmy).


    Looking for something good? Cut through the noise with a carefully curated selection of the latest releases, live events and exhibitions, straight to your inbox every fortnight, on Fridays. Sign up here.


    In charge is showrunner Christopher Storer, who came up with the concept after being inspired by his friend’s father Chris Zucchero, the owner of Chicago sandwich joint Mr Beef.

    With his professional chef sister also serving as a consultant, Storer succeeded in creating a deliciously authentic and intensely real drama. Buoyed along the way by 21 Emmys and five Golden Globes, Storer also watched his cast ascend, the tortured-soul performance of White garnering particular praise.

    Testing the parameters of a long-running show, Storer focused in on the entire cast of characters and their backstories, a successful tactic used by shows such as Orange is the New Black to keep the drama – largely confined to a kitchen set – fresh.

    Pulling in Hollywood die-hards Oliver Platt and Jamie Lee Curtis for familial tough-love roles further enriched the mix, often using a non-chronological timeframe to go back to moments of family turbulence and tension. This made for three-dimensional characters and enabled evolution around difficult themes such as the aftermath of suicide and generational trauma.

    The Bear has come a long way in three seasons, starting with a spit and sawdust establishment serving up the lunchtime beef sandwiches for its working customers.

    Carmy’s experience and longing for the high-end restaurant of his dreams hurtled forward in season two, as he sent his core crew off in different directions to hone their skills and help form his vision. A restaurant trying to win success but plagued with challenges, there were exhausting familial tensions embedded in every episode of season three.

    Several themes play out in The Bear: love, family, loyalty, community and purpose. The relationship between Carmy and cousin Richie (not a real cousin, but a term of endearment) is key to linking past and future. Richie provides some of the highlights of comedy and pathos as he spits truth bombs, most frequently at talented sous-chef Syd.

    It is Syd who follows Carmy’s aspirations for gastronomic perfection but can’t abide the lack of order or the intense highs and lows that inevitably go hand in hand with his talent. And this is one central question to consider for the latest series: just how long will the audience remain loyal to Carmy and his endless quest for artistry in a high-failure rate industry?

    It’s all in the sauce

    Storer begins season four with a ghost. Carmy and his dead brother Mikey (Jon Berthal) banter in a seven-minute scene, with Carmy ultimately confiding the dream of a restaurant as Mikey watches him make tomato sauce (“too much garlic”). The tomatoes resonate: Mikey left behind money hidden in tomato cans that ended up saving Carmy’s sanity and his dream of a proper restaurant.

    Just as oranges represent death to Frances Ford Coppola, Storer uses tomatoes to underscore themes; here they symbolise familial loyalty and history, a solid base to a meal, a core ingredient. Mikey was one of the core ingredients in Carmy’s life, and now he’s gone.

    Carmy awakens to a rerun of Groundhog Day on late-night TV and fittingly, we too are back – same dish, now more seasoned and enriched with its core ingredients and ready to serve up a big bowlful of family, love, ambition, strife and grief.

    The episode furthers the theme of loyalty as the restaurant receives The Tribune’s review – the cliffhanger of the season three finale. Naturally, Storer doesn’t let up – the food critic highlights “dissonance” and Carmy is back in emotional chaos, with Syd urging him to lighten up and lose the misery.

    In truth, this series could do with adding some more humour in the mix; the teasing and frivolous banter of season one has got somewhat lost in the seasons that followed.

    Storer ramps up the tension, setting several ticking clocks in place: chiefly Uncle Jimmy’s notice period for the business to turn a profit is literally installed on a digital clock in the kitchen. Then Syd’s headhunter calls, offering her desired autonomy and an exit strategy from the chaos.

    And Carmy raises the stakes with an intention to gain a Michelin star. Thus a heroic journey is set in place for the whole cast, with future battles both internal and external laid out.

    There’s too much going on at this feast and the feeling of being stuffed full of story is tangible by the end of the first episode. Still, with a season lining up more emotional turbulence steered by White, more celebrity cameos (Brie Larson and Rob Reiner are lined up) and the excellent cinematography and performances that we have come to expect, Storer stirs his secret sauce.

    The Bear still offers an entertaining and enticing proposition, bingeable and mostly satisfying.

    Jane Steventon does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.

    ref. The Bear season 4: this meaty restaurant drama is still an enticing bingeable prospect – https://theconversation.com/the-bear-season-4-this-meaty-restaurant-drama-is-still-an-enticing-bingeable-prospect-260143

    MIL OSI – Global Reports

  • MIL-OSI Global: Five ways to avoid illness like the Lionesses

    Source: The Conversation – UK – By Samantha Abbott, Doctoral Researcher, Department of Sport Science, Nottingham Trent University

    England’s Beth Mead cheering on podium after win v Germany in the Women European Championship Final 2022 photographyjp/Shutterstock

    Think back to the last time you had a cold or the flu. Now imagine stepping onto the pitch for a European Cup final, while battling through those symptoms. For elite athletes, illness can strike at the worst possible time – and it could hit women harder.

    Research suggests that female athletes are more susceptible to cold and flu-like illnesses than their male counterparts. For England women’s national football team, the Lionesses, this risk only increases before a major tournament like the Euros.

    Close contact, shared kit, disrupted sleep and travel all add up to a perfect storm for infection. But targeted nutritional strategies, alongside good sleep and hand hygiene, can offer a crucial line of defence.


    Get your news from actual experts, straight to your inbox. Sign up to our daily newsletter to receive all The Conversation UK’s latest coverage of news and research, from politics and business to the arts and sciences.


    1. Fuel first: energy matters for immunity

    Before anything else, players need to eat enough. Energy supports both performance and immune function. In fact, female athletes who didn’t meet their energy needs in the run-up to the 2016 Olympics were four times more likely to report cold or flu symptoms.

    This is especially relevant in women’s football, where low energy and carbohydrate intake has been documented among professional players and recreational players too. Regular meals and snacks that include carbohydrate-rich foods like oats, bread and pasta, especially around training, are essential to meet energy demands and support immune health.

    2. Eat the rainbow

    Athletes are often encouraged to go beyond the public’s five-a-day fruit and veg target, aiming instead for eight to ten portions daily. Why? Because colourful plant foods are packed with vitamins, minerals, antioxidants and anti-inflammatory compounds: all vital for immunity.




    Read more:
    We’re told to ‘eat a rainbow’ of fruit and vegetables. Here’s what each colour does in our body


    Each colour offers unique benefits. For instance, red fruits and vegetables, such as tomatoes, contain lycopene, a powerful antioxidant. Orange produce like carrots get their colour from beta-carotene, which is converted by the body into vitamin A – a key vitamin for immune health.

    Eating a rainbow of colours means getting a wide range of nutrients.

    3. Vitamin C: powerful but timing matters

    Vitamin C has long been linked with reducing the risk and severity of cold and flu symptoms. One Cochrane review found that regular vitamin C intake halved the risk of illness in physically active people.

    However, more isn’t always better. Long-term use of high-dose vitamin C supplements could blunt training adaptations – the structural and functional changes the body undergoes in response to repeated exercise – because of its anti-inflammatory effects. That’s why vitamin C is most effective when used strategically, such as during high-risk periods like travel or intense competition. Good food sources include oranges, kiwis, blackcurrants, red and yellow peppers, broccoli and even potatoes.

    4. Gut health supports immune health

    Around 70% of the immune system is located in the gut, making gut health a key player in illness prevention. This is where probiotics (live bacteria) and prebiotics (which feed those bacteria) come in.

    Probiotics, found in fermented foods like kefir and kimchi or in supplement form, have been shown to reduce the duration and severity of respiratory illnesses in athletes. Prebiotics have similarly shown promise. In one study, a 24-week prebiotic intervention in elite rugby players reduced the duration of cold and flu symptoms by over two days.




    Read more:
    Gut microbiome: meet Lactobacillus acidophilus – the gut health superhero


    In the build-up to the Euros, including probiotic-rich foods in their diet or taking a daily prebiotic and probiotic supplement may help players stay healthy and return to training faster if they do get ill.

    5. Zinc lozenges: first aid for a sore throat

    If cold-like symptoms do appear, zinc lozenges can offer fast-acting relief. Zinc has antiviral, antioxidant and anti-inflammatory properties. When zinc is delivered as a lozenge, it acts directly in the throat, where many infections begin. Taken within 24 hours of symptoms starting, zinc lozenges could shorten illness duration by a third.

    But caution is key. Long-term use of high-dose zinc supplements can actually suppress immune function. Zinc lozenges should only be used short-term at symptom onset, not as a daily supplement.

    Staying match-ready during major tournaments means more than just tactical drills and fitness. Nutrition is a powerful ally in illness prevention, especially for women’s teams like the Lionesses. From fuelling adequately to supporting gut health and knowing when to supplement, these nutritional strategies can make the difference between sitting on the bench and bringing a trophy home.

    The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    ref. Five ways to avoid illness like the Lionesses – https://theconversation.com/five-ways-to-avoid-illness-like-the-lionesses-259302

    MIL OSI – Global Reports

  • MIL-OSI Global: Why is Islamophobia so hard to define?

    Source: The Conversation – UK – By Julian Hargreaves, Lecturer, Department of Sociology and Criminology, City St George’s, University of London

    The UK government wants a new definition of Islamophobia and has created a working group of politicians, academics and independent experts to provide one. It aims to settle long-running political debates over the term.

    The concept of Islamophobia describes anti-Muslim and anti-Islamic prejudices and their impact on Muslim communities. The term became familiar in the UK following publication of the Runnymede Trust report, Islamophobia: A Challenge for Us All, in 1997.

    The concept is now used to discuss negative public opinion towards Muslims and Islam, biased media reporting, verbal and physical assaults and online attacks. It is also used when discussing social and economic inequalities, discrimination within various institutional settings and unfair treatment from the police and security services.

    Previous definitions have been controversial, failing to unite politicians, academics and British Muslims, and leading to charged debates over free speech.

    Some academics have argued that the word “Islamophobia” – which suggests a phobia or fear of Islam – is an inaccurate label for a prejudice which often targets skin colour, ethnicity and culture.

    Many Muslim-led organisations accept that the term is imperfect and interchangeable with others such as “anti-Muslim hatred”. However, they maintain the term “Islamophobia” is needed to focus attention on a growing problem.

    Definitions and controversy

    The 1997 Runnymede Trust report defined Islamophobia as an “unfounded hostility towards Islam”, “the practical consequences of such hostility in unfair discrimination against Muslim individuals and communities” and “the exclusion of Muslims from mainstream political and social affairs”.

    The Runnymede Trust revised its definition in a follow-up report published in 2017. The report defines Islamophobia in two ways.

    The first is “anti-Muslim racism”. A longer, second version amends the United Nation’s 1965 definition of “racial discrimination”. These revised definitions are important because they re-framed Islamophobia as a product of racist thinking rather than religious prejudices.

    Other attempts to define Islamophobia include British academic Chris Allen’s 200-word definition. Allen defined it as an ideology like racism that spreads negative views of Muslims and Islam, influencing social attitudes and leading to discrimination and violence. US political scientist Erik Bleich defined it more succinctly as “indiscriminate negative attitudes or emotions directed at Islam or Muslims”.

    In 2018, the all-party parliamentary group on British Muslims published another definition linking Islamophobia to racism. According to the APPG, “Islamophobia is rooted in racism and is a type of racism that targets expressions of Muslimness or perceived Muslimness.” The APPG called for its definition to be legally binding.

    The APPG definition was adopted by various organisations including local authorities, UK universities and the Labour party while in opposition. But it was rejected by the then Conservative government and later by the current Labour government, which argued it was seeking “a more integrated and cohesive approach”.

    This lack of consensus over previous definitions led Angela Rayner, the deputy prime minister, to announce the working group in March 2025. The group’s aim is to provide a new definition of “anti-Muslim hatred and Islamophobia” which is “reflective of a wide range of perspectives and priorities for British Muslims”.

    Former Conservative MP and attorney general Dominic Grieve was appointed to chair the group, evidence of Labour’s ambition to build consensus.

    A march in London against Islamophobia, racism and anti-migrant views.
    Shutterstock

    Some are concerned that use of the term “Islamophobia”, and particularly the APPG definition, stifles legitimate criticism of Islam. Free speech campaigners have argued that it is “blasphemy via the back door”.

    The centre-right thinktank Policy Exchange published a report claiming that the term is used in bad faith to divert attention away from serious social problems within some Muslim communities – specifically, discussion of the grooming gangs scandal.

    These debates bear resemblance to those surrounding the term “antisemitism” and the adoption of a definition proposed by the International Holocaust Memorial Alliance. The term is widely accepted, although critics have argued this specific definition stifles legitimate criticism of the Israeli state.

    A new approach

    A new definition of “Islamophobia” must balance the protection of Muslim communities and freedoms of religion, expression and assembly for all Muslims and non-Muslims in the UK. It must be clear enough for everyday use, specific enough for academic and policy research, and capable of generating support across the UK’s diverse Muslim population.

    A proposed definition by an emerging thought leader on British Islam addresses these challenges. Mamnun Khan is a writer whose work explores the social integration of Muslims in contemporary British society. Khan is associated with Equi, a thinktank which describes its work as “drawing on Muslim insight”. Other members of Equi are members of the government’s working group.

    Khan sets out three tests that a definition must pass, based on Islamic law, moral teachings within Islam and other more universal values. First, a definition must serve the public interest. Second, it must be just and balanced and preserve freedom of expression. Third, it must uphold the dignity of Muslim communities.

    For Khan, “Islamophobia, also known as anti-Muslim hatred, is an irrational fear, hostility, or prejudice toward Muslims that leads to discrimination, unequal treatment, exclusion, social and political marginalisation, or violence.”

    Khan’s definition has many good qualities. It brings together stronger elements of previous definitions – for, example, the separation of negative attitudes and outcomes – without being weakened by jargon or strong political ideology. On the other hand, some social scientists may question whether defining something as “irrational” is a matter of preference rather than academic research.

    The working group also needs to decide whether Islamophobia and anti-Muslim hatred are closely related or exactly the same. Failure to do so will cause confusion and inconsistency among those wishing to apply the term precisely. Regardless, Khan’s example is a strong step in the right direction. A better definition of Islamophobia is needed, and now within reach.

    Julian Hargreaves is an Affiliated Researcher at the Prince Alwaleed bin Talal Centre of Islamic Studies, University of Cambridge.

    ref. Why is Islamophobia so hard to define? – https://theconversation.com/why-is-islamophobia-so-hard-to-define-258522

    MIL OSI – Global Reports

  • MIL-OSI USA: Welch Votes No on Republicans’ Disastrous Tax Bill 

    US Senate News:

    Source: United States Senator Peter Welch (D-Vermont)

    WASHINGTON, D.C. — U.S. Senator Peter Welch (D-Vt.), a member of the Senate Finance and Judiciary Committees, and Ranking Member of the Senate Agriculture Subcommittee on Rural Development, Energy, and Credit, released the following statement after voting in strong opposition against Senate Republicans’ disastrous tax bill:   
    “We have an obligation to put the constituents and hardworking families we represent first. Instead of helping everyday people, Republicans’ tax bill capitulates to President Trump and harms communities large and small. This cruel bill will take us back decades by exacerbating income inequality, ripping away health care, and rolling back progress on climate change. It will also raise costs and weaken the economy. All of this pain has been caused to help pay for tax cuts for the very wealthy—a top priority of President Trump. I am grateful to the few Republicans—Senators Tillis, Paul, and Collins—who voted against this terrible bill,” said Senator Welch. “The irony is all these hardships will be faced by citizens in red and blue states—the pain is bipartisan. It’s outrageous that families will now face untold hardships because of the Trump Administration’s cuts. I voted no on this bill and will fight to reverse these policies in any way I can.”  
    Republicans’ reckless tax and spending bill will block access to health care for 17 million people, rip away vital food assistance for millions, cut clean energy incentives and add a tax to wind and solar energy, raise utility bills and grocery prices, and tank the economy—all to pay for tax cuts for the very wealthy.    
    Senator Welch filed amendments and changes to Republicans’ One Big Beautiful Bill Act to strengthen the economy, protect access to health care and nutrition programs, and provide more stability for families and rural communities, including provisions to: 
    Protect Access to Health Care and Support Rural Hospitals:  

    Welch proposed requiring the Finance Committee to rewrite the bill to prevent harm to rural health care and the fiscal wellbeing of rural hospitals;  

    Welch proposed requiring the Finance Committee to exempt managed care programs operated by state governments like Vermont from any changes proposed to state directed payments.  

    Welch proposed requiring the Finance Committee to strike any changes to provider taxes, including changes that would impact states like Vermont with Medicaid expansion;  

    Welch proposed requiring the Health, Education, Labor and Pensions (HELP) Committee to make it easier to verify eligibility for the Affordable Care Act’s premium tax credits and expand special enrollment periods under certain circumstances. 

    Defend Food Assistance Programs:  

    Welch proposed requiring the Agriculture Committee to strike any cost-shifts of administering SNAP to states, which would kick American families off the food assistance they need and strain state budgets;  

    Welch proposed an amendment to strike administrative cost-shifts for SNAP;  

    Welch proposed an amendment to adjust the Thrifty Food Plan for cities, counties, and regions where the price of food is 10% higher than the national average;  

    Welch proposed an amendment that places a floor on SNAP allotments to households instead of a ceiling;  

    Welch proposed an amendment preserving the standard utility deduction, which cuts administrative red tape and boosts benefits by providing a more accurate portrayal of a household’s available resources for food when determining SNAP eligibility; 

    Welch proposed requiring the Agriculture Committee to rewrite the bill to allow volunteer work to qualify under SNAP’s work requirements.   

    Protect Programs and Government Services:  

    Welch proposed requiring the Finance Committee to rewrite the bill to maintain the energy efficient home improvement tax credit at current levels through 2028;  

    Welch proposed an amendment to strike the repeal of several home energy efficiency tax credits, including credits for home energy, rooftop solar, energy efficient homes for homebuilders, and more;  

    Welch proposed striking language in the bill that would rescind funding for state-based contractor training grants, as required in Welch’s HOPE for HOMES Act, passed as part of the Inflation Reduction Act;  

    Welch proposed striking language in the bill that would institute taxes on international remittances.  

    Welch proposed an amendment to dedicate funding for residential reentry centers, which are needed in Vermont;  

    Welch proposed an amendment to dedicate funding for the federal public defenders program, which is currently underfunded. 

    Senator Welch has been an outspoken opponent of the President Trump’s One Big Beautiful Bill Act, which Republicans are advancing through reconciliation process without Democratic support. Late Sunday evening, Senator Welch took to the Senate floor to reveal how Republicans’ disastrous tax and spending bill will force millions of working Americans in Vermont, West Virginia, and across the country to lose their health coverage, rip away vital food assistance for more than 42 million Americans, cut clean energy incentives and add a tax to wind and solar energy, raise utility bills and grocery prices, and tank the economy—all to pay for tax cuts for the very wealthy.   
    Welch has slammed the bill for threatening access to health care and cutting food assistance, and has sounded the alarm about how this bill will add more than $4 trillion to the national debt and tank the economy.    

    MIL OSI USA News

  • MIL-OSI Economics: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations

    Source: Microsoft

    Headline: Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations

    Since 2024, Microsoft Threat Intelligence has observed remote information technology (IT) workers deployed by North Korea leveraging AI to improve the scale and sophistication of their operations, steal data, and generate revenue for the Democratic People’s Republic of Korea (DPRK). Among the changes noted in the North Korean remote IT worker tactics, techniques, and procedures (TTPs) include the use of AI tools to replace images in stolen employment and identity documents and enhance North Korean IT worker photos to make them appear more professional. We’ve also observed that they’ve been utilizing voice-changing software.

    North Korea has deployed thousands of remote IT workers to assume jobs in software and web development as part of a revenue generation scheme for the North Korean government. These highly skilled workers are most often located in North Korea, China, and Russia, and use tools such as virtual private networks (VPNs) and remote monitoring and management (RMM) tools together with witting accomplices to conceal their locations and identities.

    Historically, North Korea’s fraudulent remote worker scheme has focused on targeting United States (US) companies in the technology, critical manufacturing, and transportation sectors. However, we’ve observed North Korean remote workers evolving to broaden their scope to target various industries globally that offer technology-related roles. Since 2020, the US government and cybersecurity community have identified thousands of North Korean workers infiltrating companies across various industries.

    Organizations can protect themselves from this threat by implementing stricter pre-employment vetting measures and creating policies to block unapproved IT management tools. For example, when evaluating potential employees, employers and recruiters should ensure that the candidates’ social media and professional accounts are unique and verify their contact information and digital footprint. Organizations should also be particularly cautious with staffing company employees, check for consistency in resumes, and use video calls to confirm a worker’s identity.

    Microsoft Threat Intelligence tracks North Korean IT remote worker activity as Jasper Sleet (formerly known as Storm-0287). We also track several other North Korean activity clusters that pursue fraudulent employment using similar techniques and tools, including Storm-1877 and Moonstone Sleet. To disrupt this activity and protect our customers, we’ve suspended 3,000 known Microsoft consumer accounts (Outlook/Hotmail) created by North Korean IT workers. We have also implemented several detections to alert our customers of this activity through Microsoft Entra ID Protection and Microsoft Defender XDR as noted at the end of this blog. As with any observed nation-state threat actor activity, Microsoft has directly notified targeted or compromised customers, providing them with important information needed to secure their environments. As we continue to observe more attempts by threat actors to leverage AI, not only do we report on them, but we also have principles in place to take action against them.

    This blog provides additional information on the North Korean remote IT worker operations we published previously, including Jasper Sleet’s usual TTPs to secure employment, such as using fraudulent identities and facilitators. We also provide recent observations regarding their use of AI tools. Finally, we share detailed guidance on how to investigate, monitor, and remediate possible North Korean remote IT worker activity, as well as detections and hunting capabilities to surface this threat.

    From North Korea to the world: The remote IT workforce

    Since at least early 2020, Microsoft has tracked a global operation conducted by North Korea in which skilled IT workers apply for remote job opportunities to generate revenue and support state interests. These workers present themselves as foreign (non-North Korean) or domestic-based teleworkers and use a variety of fraudulent means to bypass employment verification controls.

    North Korea’s fraudulent remote worker scheme has since evolved, establishing itself as a well-developed operation that has allowed North Korean remote workers to infiltrate technology-related roles across various industries. In some cases, victim organizations have even reported that remote IT workers were some of their most talented employees. Historically, this operation has focused on applying for IT, software development, and administrator positions in the technology sector. Such positions provide North Korean threat actors access to highly sensitive information to conduct information theft and extortion, among other operations.

    North Korean IT workers are a multifaceted threat because not only do they generate revenue for the North Korean regime, which violates international sanctions, they also use their access to steal sensitive intellectual property, source code, or trade secrets. In some cases, these North Korean workers even extort their employer into paying them in exchange for not publicly disclosing the company’s data.

    Between 2020 and 2022, the US government found that over 300 US companies in multiple industries, including several Fortune 500 companies, had unknowingly employed these workers, indicating the magnitude of this threat. The workers also attempted to gain access to information at two government agencies. Since then, the cybersecurity community has continued to detect thousands of North Korean workers. On January 3, 2025, the Justice Department released an indictment identifying two North Korean nationals and three facilitators responsible for conducting fraudulent work between 2018 and 2024. The indicted individuals generated a revenue of at least US$866,255 from only ten of the at least 64 infiltrated US companies.

    North Korean threat actors are evolving across the threat landscape to incorporate more sophisticated tactics and tools to conduct malicious employment-related activity, including the use of custom and AI-enabled software.

    Tactics and techniques

    The tactics and techniques employed by North Korean remote IT workers involve a sophisticated ecosystem of crafting fake personas, performing remote work, and securing payments. North Korean IT workers apply for remote roles, in various sectors, at organizations across the globe.

    They create, rent, or procure stolen identities that match the geo-location of their target organizations (for example, they would establish a US-based identity to apply for roles at US-based companies), create email accounts and social media profiles, and establish legitimacy through fake portfolios and profiles on developer platforms like GitHub and LinkedIn. Additionally, they leverage AI tools to enhance their operations, including image creation and voice-changing software. Facilitators play a crucial role in validating fraudulent identities and managing logistics, such as forwarding company hardware and creating accounts on freelance job websites. To evade detection, these workers use VPNs, virtual private servers (VPSs), and proxy services as well as RMM tools to connect to a device housed at a facilitator’s laptop farm located in the country of the job.

    Figure 1. The North Korean IT worker ecosystem

    Crafting fake personas and profiles

    The North Korean remote IT worker fraud scheme begins with the procurement of identities for the workers. These identities, which can be stolen or “rented” from witting individuals, include names, national identification numbers, and dates of birth. The workers might also leverage services that generate fraudulent identities, complete with seemingly legitimate documentation, to fabricate their personas. They then create email accounts and social media pages they use to apply for jobs, often indirectly through staffing or contracting companies. They also apply for freelance opportunities through freelancer sites as an additional avenue for revenue generation. Notably, they often use the same names/profiles repeatedly rather than creating unique personas for each successful infiltration.

    Additionally, the North Korean IT workers have used fake profiles on LinkedIn to communicate with recruiters and apply for jobs.

    Figure 2. An example of a North Korean IT worker LinkedIn profile that has since been taken down.

    The workers tailor their fake resumes and profiles to match the requirements for specific remote IT positions, thus increasing their chances of getting selected. Over time, we’ve observed these fake resumes and employee documents noticeably improving in quality, now appearing more polished and lacking grammatical errors facilitated by AI.

    After creating their fake personas, the North Korean IT workers then attempt to establish legitimacy by creating digital footprints for these fake personas. They typically leverage communication, networking, and developer platforms, (for example, GitHub) to showcase their supposed portfolio of previous work samples:

    Figure 3. Example profile used by a North Korean IT worker that has since been taken down.

    Using AI to improve operations

    Microsoft Threat intelligence has observed North Korean remote IT workers leveraging AI to improve the quantity and quality of their operations. For example, in October 2024, we found a public repository containing actual and AI-enhanced images of suspected North Korean IT workers:

    Figure 4. Photos of potential North Korean IT workers

    The repository also contained the resumes and email accounts used by the said workers, along with the following tools and resources they can use to secure employment and to do their work:

    • VPS and VPN accounts, along with specific VPS IP addresses
    • Playbooks on conducting identity theft and creating and bidding jobs on freelancer websites
    • Wallet information and suspected payments made to facilitators
    • LinkedIn, GitHub, Upwork, TeamViewer, Telegram, and Skype accounts
    • Tracking sheet of work performed, and payments received by the IT workers

    Image creation

    Based on our review of the repository mentioned previously, North Korean IT workers appear to conduct identity theft and then use AI tools like Faceswap to move their pictures over to the stolen employment and identity documents. The attackers also use these AI tools to take pictures of the workers and move them to more professional looking settings. The workers then use these AI-generated pictures on one or more resumes or profiles when applying for jobs.

    Figure 5. Use of AI apps to modify photos used for North Korean IT workers’ resumes and profiles
    Figure 6. Examples of resumes for North Korean IT workers. These two resumes use different versions of the same photo.

    Communications

    Microsoft Threat Intelligence has observed that North Korean IT workers are also experimenting with other AI technologies such as voice-changing software. While we haven’t observed threat actors using combined AI voice and video products as a tactic first hand, we do recognize that combining these technologies could allow future threat actor campaigns to trick interviewers into thinking they aren’t communicating with a North Korean IT worker. If successful, this tactic could allow the North Korean IT workers to do interviews directly and no longer rely on facilitators standing in for them on interviews or selling them account access.

    Facilitators for initial access

    North Korean Remote IT workers require assistance from a witting facilitator to help find jobs, pass the employment verification process, and once hired, successfully work remotely. We’ve observed Jasper Sleet advertising job opportunities for facilitator roles under the guise of partnering with a remote job candidate to help secure an IT role in a competitive market:

    Figure 7. Example of a job opportunity for a facilitator role

    The IT workers may have the facilitators assist in creating accounts on remote and freelance job websites. They might also ask the facilitator to perform the following tasks as their relationship builds:

    • Create a bank account for the North Korean IT worker, or lend their (the facilitator’s) own account to the worker
    • Purchase mobile phone numbers or SIM cards

    During the employment verification process, the witting accomplice helps the North Korean IT workers validate the latter’s fraudulent identities using online background check service providers. The documents submitted by the workers include fake or stolen drivers’ licenses, social security cards, passports, and permanent resident identification cards. Workers train using interview scripts, which include a justification for why the employee must work remotely.

    Once hired, the remote workers direct company laptops and hardware to be sent to the address of the accomplice. The accomplice then either runs a laptop farm that provides the laptops with an internet connection at the geo-location of the role or forwards the items internationally. For hardware that remain in the country of the role, the accomplice signs into the computers and installs software that enables the workers to connect remotely. Remote IT workers might also access devices remotely using IP-based KVM devices, like PiKVM or TinyPilot.

    Defense evasion and persistence

    To conceal their physical location as well as maintain persistence and blend into the target organization’s environment, the workers typically use VPNs (particularly Astrill VPN), VPSs, proxy services, and RMM tools. Microsoft Threat Intelligence has observed the persistent use of JumpConnect, TinyPilot, Rust Desk, TeamViewer, AnyViewer, and Anydesk. When an in-person presence or face-to-face meeting is required, for example to confirm banking information or attend a meeting, the workers have been known to pay accomplices to stand in for them. When possible, however, the workers eliminate all face-to-face contact, offering fraudulent excuses for why they are not on camera during video teleconferencing calls or speaking.

    Attribution

    Microsoft Threat Intelligence uses the name Jasper Sleet (formerly known as Storm-0287) to represent activity associated with North Korean’s remote IT worker program. These workers are primarily focused on revenue generation, use remote access tools, and likely fall under a particular leadership structure in North Korea. We also track several other North Korean activity clusters that pursue fraudulent employment using similar techniques and tools, including Storm-1877 and Moonstone Sleet.

    How Microsoft disrupts North Korean remote IT worker operations with machine learning

    Microsoft has successfully scaled analyst tradecraft to accelerate the identification and disruption of North Korean IT workers in customer environments by developing a custom machine learning solution. This has been achieved by leveraging Microsoft’s existing threat intelligence and weak signals generated by monitoring for many of the red flags listed in this blog, among others. For example, this solution uses impossible time travel risk detections, most commonly between a Western nation and China or Russia. The machine learning workflow uses these features to surface suspect accounts most likely to be North Korean IT workers for assessment by Microsoft Threat Intelligence analysts.

    Once Microsoft Threat Intelligence reviews and confirms that an account is indeed associated with a North Korean IT worker, customers are then notified with a Microsoft Entra ID Protection risk detection warning of a risky sign-in based on Microsoft’s threat intelligence. Microsoft Defender XDR customers also receive the alert Sign-in activity by a suspected North Korean entity in the Microsoft Defender portal.

    Defending against North Korean remote IT worker infiltration

    Defending against the threats from North Korean remote IT workers involves a threefold strategy:

    • Ensuring a proper vetting approach is in place for freelance workers and vendors
    • Monitoring for anomalous user activity
    • Responding to suspected Jasper Sleet signals in close coordination with your insider risk team

    Investigate

    How can you identify a North Korean remote IT worker in the hiring process?

    To protect your organization against a potential North Korean insider threat, it is important for your organization to prioritize a process for verifying employees to identify potential risks. The following can be used to assess potential employees:

    • Confirm the potential employee has a digital footprint and look for signs of authenticity. This includes a real phone number (not VoIP), a residential address, and social media accounts. Ensure the potential employee’s social media/professional accounts are not highly similar to the accounts of other individuals. In addition, check that the contact phone number listed on the potential employee’s account is unique and not also used by other accounts.
    • Scrutinize resumes and background checks for consistency of names, addresses, and dates. Consider contacting references by phone or video-teleconference rather than email only.
    • Exercise greater scrutiny for employees of staffing companies, since this is the easiest avenue for North Korean workers to infiltrate target companies.
    • Search whether a potential employee is employed at multiple companies using the same persona.
    • Ensure the potential employee is seen on camera during multiple video telecommunication sessions. If the potential employee reports video and/or microphone issues that prohibit participation, this should be considered a red flag.
    • During video verification, request individuals to physically hold driver’s licenses, passports, or identity documents up to camera.
    • Keep records, including recordings of video interviews, of all interactions with potential employees.
    • Require notarized proof of identity.

    Monitor

    How can your organization prevent falling victim to the North Korean remote IT worker technique?

    To prevent the risks associated with North Korean insider threats, it’s vital to monitor for activity typically associated with this fraudulent scheme.

    Monitor for identifiable characteristics of North Korean remote workers

    Microsoft has identified the following characteristics of a North Korean remote worker. Note that not all the criteria are necessarily required, and further, a positive identification of a remote worker doesn’t guarantee that the worker is North Korean.

    • The employee lists a Chinese phone number on social media accounts that is used by other accounts.
    • The worker’s work-issued laptop authenticates from an IP address of a known North Korean IT worker laptop farm, or from foreign—most commonly Chinese or Russian—IP addresses even though the worker is supposed to have a different work location.
    • The worker is employed at multiple companies using the same persona. Employees of staffing companies require heightened scrutiny, given this is the easiest way for North Korean workers to infiltrate target companies.
    • Once a laptop is issued to the worker, RMM software is immediately downloaded onto it and used in combination with a VPN.
    • The worker has never been seen on camera during a video telecommunication session or is only seen a few times. The worker may also report video and/or microphone issues that prohibit participation from the start.
    • The worker’s online activity doesn’t align with routine co-worker hours, with limited engagement across approved communication platforms.

    Monitor for activity associated with Jasper Sleet access

    • If RMM tools are used in your environment, enforce security settings where possible, to implement MFA:
      • If an unapproved installation is discovered, reset passwords for accounts used to install the RMM services. If a system-level account was used to install the software, further investigation may be warranted.
    • Monitor for impossible travel—for example, a supposedly US-based employee signing in from China or Russia.
    • Monitor for use of public VPNs such as Astrill. For example, IP addresses associated with VPNs known to be used by Jasper Sleet can be added to Sentinel watchlists. Or, Microsoft Defender for Identity can integrate with your VPN solution to provide more information about user activity, such as extra detection for abnormal VPN connections.
    • Monitor for signals of insider threats in your environment. Microsoft Purview Insider Risk Management can help identify potentially malicious or inadvertent insider risks.
    • Monitor for consistent user activity outside of typical working hours.

    Remediate

    What are the next steps if you positively identify a North Korean remote IT worker employed at your company?

    Because Jasper Sleet activity follows legitimate job offers and authorized access, Microsoft recommends approaching confirmed or suspected Jasper Sleet intrusions with an insider risk approach using your organization’s insider risk response plan or incident response provider like Microsoft Incident Response. Some steps might include:

    • Restrict response efforts to a small, trusted insider risk working group, trained in operational security (OPSEC) to avoid tipping off subjects and potential collaborators.
    • Rapidly evaluate the subject’s proximity to critical assets, such as:
      • Leadership or sensitive teams
      • Direct reports or vendor staff the subject has influence over
      • Suppliers or vendors
      • People/non-people accounts, production/pre-production environments, shared accounts, security groups, third-party accounts, security groups, distribution groups, data clusters, and more
    • Conduct preliminary link analysis to:
      • Detect relationships with potential collaborators, supporters, or other potential aliases operated by the same actor
      • Identify shared indicators (for example, shared IP addresses, behavioral overlap)
      • Avoid premature action that might alert other Jasper Sleet operators
    • Conduct a risk-based prioritization of efforts, informed by:
      • Placement and access to critical assets (not necessarily where you identified them)
      • Stakeholder insight from potentially impacted business units
      • Business impact considerations of containment (which might support additional collection/analysis) or mitigation (for example, eviction)
    • Conduct open-source intelligence (OSINT) collection and analysis to:
      • Determine if the identity associated with the threat actor is associated with a real person. For example, North Korean IT workers have leveraged stolen identities of real US persons to facilitate their fraud. Conduct OSINT on all available personally identifiable information (PII) provided by the actor (name, date of birth, SSN, home of record, phone number, emergency contact, and others) and determine if these items are linked to additional North Korean actors, and/or real persons’ identities.
      • Gather all known external accounts operated by the alias/persona (for example, LinkedIn, GitHub, freelance working sites, bug bounty programs).
      • Perform analysis on account images using open-source tools such as FaceForensics++ to determine prevalence of AI-generated content. Detection opportunities within video and imagery include: 
        • Temporal consistency issues: Rapid movements cause noticeable artifacts in video deepfakes as the tracking system struggles to maintain accurate landmark positioning. 
        • Occlusion handling: When objects pass over the AI-generated content such as the face, deepfake systems tend to fail at properly reconstructing the partially obscured face.
        • Lighting adaptation: Changes in lighting conditions might reveal inconsistencies in the rendering of the face
        • Audio-visual synchronization: Slight delays between lip movements and speech are detectable under careful observation
          • Exaggerated facial expressions. 
          • Duplicative or improperly placed appendages.
          • Pixelation or tearing at edges of face, eyes, ears, and glasses.
    • Engage counterintelligence or insider risk/threat teams to:
      • Understand tradecraft and likely next steps
      • Gain national-level threat context, if applicable
    • Make incremental, risk-based investigative and response decisions with the support of your insider threat working group and your insider threat stakeholder group; one providing tactical feedback and the other providing risk tolerance feedback.
    • Preserve evidence and document findings.
    • Share lessons learned and increase awareness.
    • Educate employees on the risks associated with insider threats and provide regular security training for employees to recognize and respond to threats, including a section on the unique threat posed by North Korean IT workers.

    After an insider risk response to Jasper Sleet, it might be necessary to also conduct a thorough forensic investigation of all systems that the employee had access to for indicators of persistence, such as RMM tools or system/resource modifications.

    For additional resources, refer to CISA’s Insider Threat Mitigation Guide. If you suspect your organization is being targeted by nation-state cyber activity, report it to the appropriate national authority. For US-based organizations, the Federal Bureau of Investigation (FBI) recommends reporting North Korean remote IT worker activity to the Internet Crime Complaint Center (IC3).

    Microsoft Defender XDR detections

    Microsoft Defender XDR customers can refer to the list of applicable detections below. Microsoft Defender XDR coordinates detection, prevention, investigation, and response across endpoints, identities, email, apps to provide integrated protection against attacks like the threat discussed in this blog.

    Customers with provisioned access can also use Microsoft Security Copilot in Microsoft Defender to investigate and respond to incidents, hunt for threats, and protect their organization with relevant threat intelligence.

    Microsoft Defender XDR

    Alerts with the following titles in the security center can indicate threat activity on your network:

    • Sign-in activity by a suspected North Korean entity

    Microsoft Defender for Endpoint

    Alerts with the following titles in the security center can indicate Jasper Sleet RMM activity on your network. These alerts, however, can be triggered by unrelated threat activity.

    • Suspicious usage of remote management software
    • Suspicious connection to remote access software

    Microsoft Defender for Identity

    Alerts with the following titles in the security center can indicate atypical identity access on your network. These alerts, however, can be triggered by unrelated threat activity.

    • Atypical travel
    • Suspicious behavior: Impossible travel activity

    Microsoft EntraID Protection

    Microsoft Entra ID Protection risk detections inform Entra ID user risk events and can indicate associated threat activity, including unusual user activity consistent with known patterns identified by Microsoft Threat Intelligence research. Note, however, that these alerts can be also triggered by unrelated threat activity.

    • Microsoft Entra threat intelligence (sign-in): (RiskEventType: investigationsThreatIntelligence)

    Microsoft Defender for Cloud Apps

    Alerts with the following titles in the security center can indicate atypical identity access on your network. These alerts, however, can be triggered by unrelated threat activity.

    • Impossible travel activity

    Microsoft Security Copilot

    Security Copilot customers can use the standalone experience to create their own prompts or run the following pre-built promptbooks to automate incident response or investigation tasks related to this threat:

    • Incident investigation
    • Microsoft User analysis
    • Threat actor profile

    Note that some promptbooks require access to plugins for Microsoft products such as Microsoft Defender XDR or Microsoft Sentinel.

    Hunting queries

    Microsoft Defender XDR

    Because organizations might have legitimate and frequent uses for RMM software, we recommend using the Microsoft Defender XDR advanced hunting queries available on GitHub to locate RMM software that hasn’t been endorsed by your organization for further investigation. In some cases, these results might include benign activity from legitimate users. Regardless of use case, all newly installed RMM instances should be scrutinized and investigated.

    If any queries have high fidelity for discovering unsanctioned RMM instances in your environment, and don’t detect benign activity, you can create a custom detection rule from the advanced hunting query in the Microsoft Defender portal. 

    Microsoft Sentinel

    The alert Insider Risk Sensitive Data Access Outside Organizational Geo-locationjoins Azure Information Protection logs (InformationProtectionLogs_CL) with Microsoft Entra ID sign-in logs (SigninLogs) to provide a correlation of sensitive data access by geo-location. Results include:

    • User principal name
    • Label name
    • Activity
    • City
    • State
    • Country/Region
    • Time generated

    The recommended configuration is to include (or exclude) sign-in geo-locations (city, state, country and/or region) for trusted organizational locations. There is an option for configuration of correlations against Microsoft Sentinel watchlists. Accessing sensitive data from a new or unauthorized geo-location warrants further review.

    References

    Acknowledgments

    For more information on North Korean remote IT worker operations, we recommend reviewing DTEX’s in-depth analysis in the report Exposing DPRK’s Cyber Syndicate and IT Workforce.

    Learn more

    Meet the experts behind Microsoft Threat Intelligence, Incident Response, and the Microsoft Security Response Center at our VIP Mixer at Black Hat 2025. Discover how our end-to-end platform can help you strengthen resilience and elevate your security posture.

    For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog. 

    To get notified about new publications and to join discussions on social media, follow us on LinkedIn, X (formerly Twitter), and Bluesky. 

    To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the Microsoft Threat Intelligence podcast. 

    MIL OSI Economics

  • MIL-OSI USA: Sen. Budd Votes for the One Big Beautiful Bill Act ToDeliver Historic Tax Cuts for North Carolina Families

    US Senate News:

    Source: United States Senator Ted Budd (R-North Carolina)
    Washington, D.C. — U.S. Senator Ted Budd (R-N.C.) released the following statement after voting in support of President Trump’s One Big Beautiful Bill Act, historic legislation that lowers taxes for families, makes America safer and more secure, and unleashes economic growth for the future:
    “I voted in favor of the One Big Beautiful Bill Act because the people of North Carolina deserve more of their hard-earned wages, a more secure border, a reinvigorated military, responsible spending reforms for government programs, and a thriving economy. My colleagues and I fought successfully to protect North Carolina’s tobacco growers to help them stay competitive with China. I am also grateful that this bill included my PELL Act, which will help Americans earn in-demand credentials for rewarding careers. I hope my colleagues in the House quickly get this bill on President Trump’s desk because Americans cannot afford the largest tax increase in our nation’s history,” said Sen. Budd. 
    Here’s How the One Big Beautiful Bill Act Directly Benefits North Carolina:
    Provides Unprecedented Tax Relief for Families
    This legislation helps Americans keep more money in their pockets by extending key provisions of President Trump’s 2017 Tax Cuts and Jobs Act. Preventing the largest tax increase in American history will save the average North Carolinian $2,474 in 2026.
    Working families will receive significant savings with the increase and permanence of the child tax credit, expanded tax credits for paid leave, enhanced 529 savings accounts, and additional childcare access.
    This legislation lowers taxes for seniors relying on Social Security.
    Gives Workers the Tools They Need to Advance Their Careers
    Sen. Budd fought to have his PELL Act included in this legislation, a provision that expands Pell Grant eligibility for high-quality, short-term workforce programs. This would benefit individuals seeking to advance their careers without long-term debt while also providing American businesses with a broader, better-prepared talent pool ready to meet the demands of a rapidly evolving economy.
    Protects North Carolina Agriculture
    Sen. Budd successfully defended tobacco’s eligibility to receive the “duty drawback,” allowing tobacco manufacturers to receive reimbursement for the tariffs they pay on materials used to produce tobacco products that they ship to international markets. This will protect North Carolina growers and prevent the tobacco market from being flooded with cheaper, lower-quality products from China and Brazil.
    This legislation provides serious tax relief for North Carolina farmers by raising the death tax exemption, ensuring family farms can be passed down to future generations, rather than being broken up and sold.
    Unlocks Economic Growth & American Manufacturing
    This legislation will create a renaissance in American manufacturing by delivering full expensing for companies that build new factories and invest in equipment and machinery. This will help create new, good-paying jobs.
    By enhancing the small business deduction and making it permanent, small businesses will be able to hire more workers.
    Increasing deductions for small businesses’ equipment and property will quickly help businesses grow.
    Reduces Government Spending to Preserve & Protect Government Programs
    This legislation contains the first structural reforms to address waste, fraud, and abuse in key government programs like SNAP and Medicaid in over three decades. Slowing the rate of exponential cost increases will result in significant deficit savings and will preserve and protect these programs for future generations.
    Invests in America’s National Defense
    Sen. Budd helped secure funding to boost manufacturing capacity for the next generation of the F-15, the F-15EX, which will sustain the training mission at Seymour Johnson far into the future. 
    This legislation also includes significant funding to enhance America’s air superiority by preventing the retirement of the F-15E aircraft flying out of Seymour Johnson Air Force Base. 
    America’s troops deserve a pay raise. This legislation increases pay and allowances while making improvements to housing, healthcare, childcare, and education.
    This legislation makes generational investments in our military readiness that will protect the American homeland and deter our adversaries by boosting America’s missile defense by building the “Golden Dome.”
    Sen. Budd worked to secure investments to improve housing at Fort Bragg and Seymour Johnson and funds for restoration and modernization at Camp Lejeune.
    This legislation creates new production lines to scale innovative, cost-effective munitions, so we are no longer shooting $4M missiles at $50,000 drones.
    This legislation makes the largest ever investment in the Coast Guard’s history, which will purchase more than 40 new helicopters and six new C-130J aircraft, which will be serviced at the Aviation Technical Training Center in Elizabeth City. The legislation also funds 17 new icebreakers to protect American interests and 21 new cutters to combat drug runners and human traffickers.
    Keeps America’s Border Secure
    While President Trump’s policies have resulted in a dramatic drop-off of illegal immigration, this legislation also boosts America’s border security by surging funding for 3,000 new Border Patrol agents and 10,000 new ICE agents. The One Big Beautiful Bill also increases funding to finish President Trump’s border wall.
    Ushers in Next-Generation Technologies
    This legislation includes funding for the transformational air traffic control modernization project underway at the FAA. This will quickly update aging and failing technologies to keep Americans safe in the sky.
    This legislation makes a historic amount of spectrum available for commercial use, which will create new jobs and unleash the next generation of wireless technology. This will ensure America remains the premier destination for innovation and help unleash a new area of advanced manufacturing. This will also make the internet faster & more dependable across the country through commercial success stories like 5G, 6G, wi-fi, and private networks using CBRS.

    MIL OSI USA News

  • MIL-OSI USA: The Justice Department Files Lawsuit Against Sanctuary City Policies In Los Angeles, California

    Source: US State of North Dakota

    Today, the Department of Justice filed a lawsuit against the City of Los Angeles, California, Los Angeles Mayor Karen Bass, and the Los Angeles City Council over policies that Los Angeles enacted shortly after President Donald J. Trump’s reelection to interfere with the federal government’s enforcement of its immigration laws.

    Not only are Los Angeles’s “sanctuary city” policies illegal under federal law, but, as alleged in the complaint, Los Angeles’s refusal to cooperate with federal immigration authorities contributed to the recent lawlessness, rioting, looting, and vandalism that was so severe that it required the federal government to deploy the California National Guard and the United States Marines to quell the chaos.

    “Sanctuary policies were the driving cause of the violence, chaos, and attacks on law enforcement that Americans recently witnessed in Los Angeles,” said Attorney General Pamela Bondi. “Jurisdictions like Los Angeles that flout federal law by prioritizing illegal aliens over American citizens are undermining law enforcement at every level – it ends under President Trump.”

    “Today’s lawsuit holds the City of Los Angeles accountable for deliberately obstructing the enforcement of federal immigration law,” said U.S. Attorney Bill Essayli for the Central District of California. “The United States Constitution’s Supremacy Clause prohibits the City from picking and choosing which federal laws will be enforced and which will not. By assisting removable aliens in evading federal law enforcement, the City’s unlawful and discriminatory ordinance has contributed to a lawless and unsafe environment that this lawsuit will help end.”

    On her first day in office, Attorney General Bondi instructed the Department’s Civil Division to identify state and local laws, policies, and practices that facilitate violations of federal immigration laws or impede lawful federal immigration operations, and, where appropriate, to take legal action to challenge such laws, policies, and practices. Today’s lawsuit is the latest in a series of lawsuits brought by the Civil Division targeting illegal sanctuary city policies across the country, including in New York and New Jersey.

    MIL OSI USA News

  • MIL-OSI USA: Justice Department Announces Coordinated, Nationwide Actions to Combat North Korean Remote Information Technology Workers’ Illicit Revenue Generation Schemes

    Source: US State of North Dakota

    Law Enforcement Actions Across 16 States Result in Charges, Arrest, and Seizures of 29 Financial Accounts, 21 Fraudulent Websites, and Approximately 200 Computers

    The Justice Department announced today coordinated actions against the Democratic People’s Republic of North Korea (DPRK) government’s schemes to fund its regime through remote information technology (IT) work for U.S. companies. These actions include two indictments, an arrest, searches of 29 known or suspected “laptop farms” across 16 states, and the seizure of 29 financial accounts used to launder illicit funds and 21 fraudulent websites.

    According to court documents, the schemes involve North Korean individuals fraudulently obtaining employment with U.S. companies as remote IT workers, using stolen and fake identities. The North Korean actors were assisted by individuals in the United States, China, United Arab Emirates, and Taiwan, and successfully obtained employment with more than 100 U.S. companies.

    As alleged in court documents, certain U.S.-based individuals enabled one of the schemes by creating front companies and fraudulent websites to promote the bona fides of the remote IT workers, and hosted laptop farms where the remote North Korean IT workers could remote access into U.S. victim company-provided laptop computers. Once employed, the North Korean IT workers received regular salary payments, and they gained access to, and in some cases stole, sensitive employer information such as export controlled U.S. military technology and virtual currency. In another scheme, North Korean IT workers used false or fraudulently obtained identities to gain employment with an Atlanta, Georgia-based blockchain research and development company and stole virtual currency worth approximately over $900,000.

    “These schemes target and steal from U.S. companies and are designed to evade sanctions and fund the North Korean regime’s illicit programs, including its weapons programs,” said Assistant Attorney General John A. Eisenberg of the Department’s National Security Division. “The Justice Department, along with our law enforcement, private sector, and international partners, will persistently pursue and dismantle these cyber-enabled revenue generation networks.”

    “North Korean IT workers defraud American companies and steal the identities of private citizens, all in support of the North Korean regime,” said Assistant Director Brett Leatherman of FBI’s Cyber Division. “That is why the FBI and our partners continue to work together to disrupt infrastructure, seize revenue, indict overseas IT workers, and arrest their enablers in the United States. Let the actions announced today serve as a warning: if you host laptop farms for the benefit of North Korean actors, law enforcement will be waiting for you.”

    “North Korea remains intent on funding its weapons programs by defrauding U.S. companies and exploiting American victims of identity theft, but the FBI is equally intent on disrupting this massive campaign and bringing its perpetrators to justice,” said Assistant Director Roman Rozhavsky of the FBI Counterintelligence Division. “North Korean IT workers posing as U.S. citizens fraudulently obtained employment with American businesses so they could funnel hundreds of millions of dollars to North Korea’s authoritarian regime. The FBI will do everything in our power to defend the homeland and protect Americans from being victimized by the North Korean government, and we ask all U.S. companies that employ remote workers to remain vigilant to this sophisticated threat.”

    Zhenxing Wang, et al. Indictment, Seizure Warrants, and Arrest – District of Massachusetts

    Today, the United States Attorney’s Office for the District of Massachusetts and the National Security Division announced the arrest of U.S. national Zhenxing “Danny” Wang of New Jersey pursuant to a five-count indictment. The indictment describes a multi-year fraud scheme by Wang and his co-conspirators to obtain remote IT work with U.S. companies that generated more than $5 million in revenue. The indictment also charges Chinese nationals Jing Bin Huang (靖斌 黄), Baoyu Zhou (周宝玉), Tong Yuze (佟雨泽), Yongzhe Xu (徐勇哲 andيونجزهي أكسو), Ziyou Yuan (زيو) and Zhenbang Zhou (周震邦), and Taiwanese nationals Mengting Liu (劉 孟婷) and Enchia Liu (刘恩) for their roles in the scheme. 

    “The threat posed by DPRK operatives is both real and immediate. Thousands of North Korean cyber operatives have been trained and deployed by the regime to blend into the global digital workforce and systematically target U.S. companies,” said U.S. Attorney Leah B. Foley for the District of Massachusetts. “We will continue to work relentlessly to protect U.S. businesses and ensure they are not inadvertently fueling the DPRK’s unlawful and dangerous ambitions.”

    According to the indictment, from approximately 2021 until October 2024, the defendants and other co-conspirators compromised the identities of more than 80 U.S. persons to obtain remote jobs at more than 100 U.S. companies, including many Fortune 500 companies, and caused U.S. victim companies to incur legal fees, computer network remediation costs, and other damages and losses of at least $3 million. Overseas IT workers were assisted by Kejia Wang, Zhenxing Wang, and at least four other identified U.S. facilitators. Kejia Wang, for example, communicated with overseas co-conspirators and IT workers, and traveled to Shenyang and Dandong, China, including in 2023, to meet with them about the scheme. To deceive U.S. companies into believing the IT workers were located in the United States, Kejia Wang, Zhenxing Wang, and the other U.S. facilitators received and/or hosted laptops belonging to U.S. companies at their residences, and enabled overseas IT workers to access the laptops remotely by, among other things, connecting the laptops to hardware devices designed to allow for remote access (referred to as keyboard-video-mouse or “KVM” switches).

    Kejia Wang and Zhenxing Wang also created shell companies with corresponding websites and financial accounts, including Hopana Tech LLC, Tony WKJ LLC, and Independent Lab LLC, to make it appear as though the overseas IT workers were affiliated with legitimate U.S. businesses. Kejia Wang and Zhenxing Wang established these and other financial accounts to receive money from victimized U.S. companies, much of which was subsequently transferred to overseas co‑conspirators. In exchange for their services, Kejia Wang, Zhenxing Wang, and the four other U.S. facilitators received a total of at least $696,000 from the IT workers.

    IT workers employed under this scheme also gained access to sensitive employer data and source code, including International Traffic in Arms Regulations (ITAR) data from a California-based defense contractor that develops artificial intelligence-powered equipment and technologies. Specifically, between on or about Jan. 19, 2024, and on or about April 2, 2024, an overseas co-conspirator remotely accessed without authorization the company’s laptop and computer files  containing technical data and other information. The stolen data included information marked as being controlled under the ITAR.

    Simultaneously with today’s announcement, the FBI and Defense Criminal Investigative Service (DCIS) seized 17 web domains used in furtherance of the charged scheme and further seized 29 financial accounts, holding tens of thousands of dollars in funds, used to launder revenue for the North Korean regime through the remote IT work scheme.

    Previously, in October 2024, as part of this investigation, federal law enforcement executed searches at eight locations across three states that resulted in the recovery of more than 70 laptops and remote access devices, such as KVMs. Simultaneously with that action, the FBI seized four web domains associated with Kejia Wang’s and Zhenxing Wang’s shell companies used to facilitate North Korean IT work.

    The FBI Las Vegas Field Office, DCIS San Diego Resident Agency, and Homeland Security Investigations San Diego Field Office are investigating the case.

    Assistant U.S. Attorney Jason Casey for the District of Massachusetts and Trial Attorney Gregory J. Nicosia, Jr. of the National Security Division’s National Security Cyber Section are prosecuting the case, with significant assistance from Legal Assistants Daniel Boucher and Margaret Coppes. Valuable assistance was also provided by Mark A. Murphy of the National Security Division’s Counterintelligence and Export Control Section and the U.S. Attorneys’ Offices for the District of New Jersey, Eastern District of New York, and Southern District of California.

    Kim Kwang Jin et al. Indictment – Northern District of Georgia

    Today, the Northern District of Georgia unsealed a five-count wire fraud and money laundering indictment charging four North Korean nationals, Kim Kwang Jin (김관진), Kang Tae Bok (강태복), Jong Pong Ju (정봉주) and Chang Nam Il (창남일), with a scheme to steal virtual currency from two companies, valued at over $900,000 at the time of the thefts, and to launder proceeds of those thefts. The defendants remain at large and wanted by the FBI.

    “The defendants used fake and stolen personal identities to conceal their North Korean nationality, pose as remote IT workers, and exploit their victims’ trust to steal hundreds of thousands of dollars,” said U.S. Attorney Theodore S. Hertzberg for the Northern District of Georgia. “This indictment highlights the unique threat North Korea poses to companies that hire remote IT workers and underscores our resolve to prosecute any actor, in the United States or abroad, who steals from Georgia businesses.”

    According to the indictment, the defendants traveled to the United Arab Emirates on North Korean travel documents and worked as a co-located team. In approximately December 2020 and May 2021, respectively, Kim Kwang Jin (using victim P.S.’s stolen identity) and Jong Pong Ju (using the alias “Bryan Cho”) were hired by a blockchain research and development company headquartered in Atlanta, Georgia, and a virtual token company based in Serbia. Both defendants concealed their North Korean identities from their employers by providing false identification documents containing a mix of stolen and fraudulent identity information. Neither company would have hired Kim Kwang Jin and Jong Pong Ju had they known that they were North Korean citizens. Later, on a recommendation from Jong Pong Ju, the Serbian company hired “Peter Xiao,” who in fact was Chang Nam Il.

    After gaining their employers’ trust, Kim Kwang Jin and Jong Pong Ju were assigned projects that provided them access to their employers’ virtual currency assets. In February 2022, Jong Pong Ju used that access to steal virtual currency worth approximately $175,000 at the time of the theft, sending it to a virtual currency address he controlled. In March 2022, Kim Kwang Jin stole virtual currency worth approximately $740,000 at the time of theft by modifying the source code of two of his employer’s smart contracts, then sending it to a virtual currency address he controlled.

    To launder the funds after the thefts, Kim Kwang Jin and Jong Pong Ju “mixed” the stolen funds using the virtual currency mixer Tornado Cash and then transferred the funds to virtual currency exchange accounts controlled by defendants Kang Tae Bok and Chang Nam Il but held in the name of aliases. These accounts were opened using fraudulent Malaysian identification documents.

    The FBI Atlanta Field Office is investigating the case.

    Assistant U.S. Attorneys Samir Kaushal and Alex Sistla for the Northern District of Georgia and Trial Attorney Jacques Singer-Emery of the National Security Division’s National Security Cyber Section are prosecuting the case.

    21 Searches of Known or Suspected U.S.-based Laptop Farms – Multi-District

    Between June 10 and June 17, 2025, the FBI executed searches of 21 premises across 14 states hosting known and suspected laptop farms. These actions, coordinated by the FBI Denver Field Office, related to investigations of North Korean remote IT worker schemes being conducted by the U.S. Attorneys’ Offices of the District of Colorado, Eastern District of Missouri, and Northern District of Texas. In total, the FBI seized approximately 137 laptops.

    Valuable assistance was provided by the U.S. Attorney’s Offices for the District of Connecticut, the Eastern District of Michigan, the Eastern District of Wisconsin, the Middle District of Florida, the Northern District of Georgia, the Northern District of Illinois, the Northern District of Indiana, the District of Oregon, the Southern District of Florida, the Southern District of Ohio, the Western District of New York, and the Western District of Pennsylvania.

    ***

    The Department’s actions to combat these schemes are the latest in a series of law enforcement actions under a joint National Security Division and FBI Cyber and Counterintelligence Divisions effort, the DPRK RevGen: Domestic Enabler Initiative. This effort prioritizes targeting and disrupting the DPRK’s illicit revenue generation schemes and its U.S.-based enablers. The Department previously announced other actions pursuant to the initiative, including in January 2025 and prior, as well as the filing of a civil forfeiture complaint in early June 2025 for over $7.74 million tied to an illegal employment scheme.

    As the FBI has described in Public Service Announcements published in May 2024 and January 2025, North Korean remote IT workers posing as legitimate remote IT workers have committed data extortion and exfiltrated the proprietary and sensitive data from U.S. companies. DPRK IT worker schemes typically involve the use of stolen identities, alias emails, social media, online cross-border payment platforms, and online job site accounts, as well as false websites, proxy computers, and witting and unwitting third parties located in the U.S. and elsewhere.

    Other public advisories about the threats, red flag indicators, and potential mitigation measures for these schemes include a May 2022 advisory released by the FBI, Department of the Treasury, and Department of State; a July 2023 advisory from the Office of the Director of National Intelligence; and guidance issued in October 2023 by the United States and the Republic of Korea (South Korea). As described the May 2022 advisory, North Korean IT workers have been known individually to earn up to $300,000 annually, generating hundreds of millions of dollars collectively each year, on behalf of designated entities, such as the North Korean Ministry of Defense and others directly involved in the DPRK’s weapons programs.

    The U.S. Department of State has offered potential rewards for up to $5 million in support of international efforts to disrupt the DPRK’s illicit financial activities, including for cybercrimes, money laundering, and sanctions evasion.

    The details in the above-described court documents are merely allegations. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI USA: Durable Medical Equipment Owner Sentenced to 12 Years for $61 Million Medicare Fraud Scheme

    Source: US State of North Dakota

    A Florida man was sentenced today to 12 years in prison and three years of supervised release for conspiring to defraud Medicare with false reimbursement claims for durable medical equipment (DME). He was also ordered to pay $21,195,540.18 in restitution and forfeiture in the amount of $2,514,040.

    According to court documents, Peter Roussonicolos, 64, of Port Saint Lucie, Florida, owned and operated five DME suppliers as a silent partner. Roussonicolos hid his involvement in the companies from Medicare because he had one or more felony convictions, making him ineligible to enroll with the government program. To further conceal his involvement, he recruited and paid co-conspirators to serve as nominee owners of the DME suppliers and caused others to falsify Medicare enrollment forms, bank records, and other documents to conceal the true ownership and control of the DME suppliers. He also knew that a co-conspirator paid kickbacks and bribes to patient recruiters in exchange for beneficiary referrals. As part of the scheme, the DME companies submitted approximately $61.5 million in false and fraudulent claims to Medicare for medically unnecessary DME that was ineligible for reimbursement and were paid approximately $26.7 million of these claims.

    “Through lies and deceit, the defendant and his co-conspirators orchestrated a $61 million fraud on Medicare,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “The defendant’s fraud drained critical government resources that could have been used to help vulnerable Americans. Today’s sentencing demonstrates the Department’s steadfast commitment to protecting taxpayer dollars and ensuring accountability for those who seek to defraud our health care programs.”

    “Today’s sentence underscores HHS-OIG’s firm commitment to thoroughly investigating individuals who engage in illegal kickback schemes to prescribe medically unnecessary durable medical equipment for their own personal financial gain,” said Deputy Inspector General for Investigations Christian J. Schrank with the U.S. Department of Health and Human Services Office of Inspector General (HHS-OIG). “We remain steadfast in our mission to protect the integrity of Medicare and other federal healthcare programs as well as the people served by those programs.”

    “This defendant and his co-conspirators orchestrated an elaborate scheme to steal millions from Medicare through kickbacks and sham billing,” said Assistant Director Jose A. Perez of the FBI Criminal Investigative Division. “Today’s sentencing demonstrates that those who exploit our healthcare system for personal gain will be held accountable. The FBI is committed to working with our partners to protect taxpayer dollars and ensure the integrity of healthcare programs.”

    In November 2024, Roussonicolos pleaded guilty to conspiracy to commit health care fraud and wire fraud.

    The FBI and HHS-OIG investigated the case.

    Trial Attorney Jennifer Burns and Assistant Chiefs Jamie de Boer and Emily Gurskis of the Criminal Division’s Fraud Section prosecuted the case. Trial Attorneys Joanna Bowman and Lindita Ciko Torza of the Special Matters Unit assisted in the prosecution.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Force Program. Since March 2007, this program, currently comprised of 9 strike forces operating in 27 federal districts, has charged more than 5,800 defendants who collectively have billed federal health care programs and private insurers more than $30 billion. In addition, the Centers for Medicare & Medicaid Services, working in conjunction with the Office of the Inspector General for the Department of Health and Human Services, are taking steps to hold providers accountable for their involvement in health care fraud schemes. More information can be found at www. justice. gov/criminal-fraud/health-care-fraud-unit.

    MIL OSI USA News

  • MIL-OSI USA: Canadian Man Arrested and Detained for Role in Deadly Alien Smuggling Conspiracy at the U.S.’s Northern Border

    Source: US State of North Dakota

    Note: View the indictment here and detention letter here.

    WASHINGTON — A dual Canadian American citizen was arrested on Sunday, June 15, for his role in a deadly human smuggling conspiracy that left a family of four, including two children under the age of three, dead in the St. Lawrence River. Oakes was arrested as he attempted to enter the United States via the Massena, New York, Port of Entry.

    Timothy Oakes, 34, from the Akwesasne Mohawk Indian Reservation (AMIR), Canada, was previously arraigned on numerous human smuggling offenses in the Northern District of New York District Court and had his detention hearing earlier today and will remain detained. Oakes was indicted on April 9 for conspiring with others to engage in alien smuggling, four counts of alien smuggling for profit, and four counts of alien smuggling resulting in death. United States based co-conspirators Dakota Montour, 31, and Kawisiiostha Celecia Sharrow, 43, both of Akwesasne-Mohawk, New York, and Janet Terrance, 45, of Hogansburg, New York, entered guilty pleas on Jan. 23, Oct. 8, 2024, and March 6, respectively.

    “As alleged, Oakes and his co-conspirators profited from a human smuggling operation with a singular, cold-hearted aim: making money by bringing illegal aliens into the United States, regardless of the danger to human life involved,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “Their greed resulted in the deaths of a mother, a father, and two small children, as well as one of the defendants’ own brothers. The Criminal Division will continue to disrupt and dismantle these organizations and bring justice to smugglers whose actions result in senseless deaths.”

    “This case shows the terrible perils of illegally crossing the border,” said U.S. Attorney John A. Sarcone III for the Northern District of New York. “Four family members died because a smuggling network put them in harm’s way. My office is proud to partner with Joint Task Force Alpha to continue to combat dangerous human smuggling and trafficking organizations that operate on our northern border.”

    “Oakes’ arrest comes as part of our nearly two-year long investigation into a transnational criminal organization responsible for the large-scale smuggling of aliens from Canada into the United States,” said U.S. Immigration and Customs Enforcement Homeland Security Investigations (ICE HSI) Buffalo Special Agent in Charge Erin Keegan. “ICE HSI leverages its full range of authorities to combat and dismantle the heinous networks of greedy criminals who illicitly sell dangerous, sometimes fatal, passage through our nation’s northern border. We are extremely grateful for a multitude of law enforcement agency partners on the Border Enforcement Security Taskforce who join us in this fight to bring smugglers to justice.”

    “Two toddler aged children and their parents were the tragic victims of an alien smuggling attempt gone horribly wrong,” said Chief Patrol Agent Robert Garcia of the U.S. Border Patrol’s Swanton Sector. “Their deaths were a direct result of callous smugglers who exploited the vulnerable. Due to unrelenting perseverance and investigative efforts by multiple law enforcement agencies, those responsible will be held accountable. Our pursuit of justice persists until justice is served.”

    According to court documents, Oakes was a key facilitator in a human smuggling organization (HSO) that smuggled aliens from Canada into northern New York. Oakes, working with the HSO, routinely smuggled aliens into the United States by piloting boats across the St. Lawrence River. Additionally, Oakes used his home as a staging area for aliens before the HSO smuggled them into the United States. Oakes earned approximately $1,000 for every alien whom he smuggled across the St. Lawrence River into the United States.

    In March 2023, Oakes housed a Romanian family of four, together with other aliens, for about 24 hours. He then transported the family and a boat to a public boat launch. His brother, Casey Oakes, attempted to use the boat to smuggle the Romanian family into the United States, but the boat capsized, killing all four members of the family, as well as Casey Oakes.    

    Terrance, Montour, and Sharrow admitted in their plea agreements that in late March 2023, they were employed to illegally transport a Romanian family of four — a mother, father, one-year-old boy, and two-year-old girl — from Canada into New York. Specifically, Montour admitted that he was aware of the dangerous weather conditions on the day of the tragedy — high winds, freezing temperatures, and limited visibility — yet another co-conspirator still loaded the family of four into the small boat to attempt to cross the St. Lawrence River.

    HSI Massena engaged in an extensive years-long investigation of the case, with assistance from the U.S. Border Patrol, U.S. Customs and Border Protection (CBP), HSI’s Human Smuggling Unit in Washington, D.C., CBP’s National Targeting Center International Interdiction Task Force, New York State Police, Canada Border Services Agency, Akwesasne Mohawk Police Service, St. Regis Mohawk Tribal Police Department, Ontario Provincial Police, Sûreté du Québec, St. Lawrence County Sheriff’s Department, Royal Canadian Mounted Police, and the Cornwall Police Service. The Justice Department’s Office of International Affairs provided significant support with foreign legal assistance requests.

    The defendant’s vehicle with light blue boat in tow on March 29, 2023, at 9:29 p.m., consistent with the boat found in the river during recovery efforts.

    The investigation is a result of the coordinated efforts of Joint Task Force Alpha (JTFA). JTFA, a partnership with the Department of Homeland Security (DHS), has been elevated and expanded by the Attorney General with a mandate to target cartels and other transnational criminal organizations and eliminate human smuggling and trafficking networks operating within the Americas that impact public safety and the security of our borders. JTFA currently comprises detailees from U.S. Attorneys’ Offices along the border, including the Northern District of New York. Dedicated support is provided by numerous components of the Justice Department’s Criminal Division, led by the Human Rights and Special Prosecutions Section (HRSP) and supported by the Money Laundering and Asset Recovery Section, the Office of Enforcement Operations and the Office of International Affairs, among others. JTFA also relies on substantial law enforcement investment from DHS, FBI, and the Drug Enforcement Administration, and other partners. To date, JTFA’s work has resulted in more than 380 domestic and international arrests of leaders, organizers, and significant facilitators of alien smuggling; more than 340 U.S. convictions; more than 290 significant jail sentences imposed; and forfeitures of substantial assets.

    The investigation is being conducted under the Extraterritorial Criminal Travel Strike Force (ECT) program, a joint partnership between the Justice Department’s Criminal Division and HSI. The ECT program focuses on human smuggling networks that may present particular national security or public safety risks, or present grave humanitarian concerns. ECT has dedicated investigative, intelligence and prosecutorial resources. ECT coordinates and receives assistance from other U.S. government agencies and foreign law enforcement authorities.

    Trial Attorney Jenna E. Reed of the Criminal Division’s HRSP and Assistant U.S. Attorney Jeffrey Stitt for the Northern District of New York are prosecuting the case.

    This case is part of Operation Take Back America, a nationwide initiative that marshals the full resources of the Department of Justice to repel the invasion of illegal immigration, achieve the total elimination of cartels and transnational criminal organizations and protect our communities from the perpetrators of violent crime. Operation Take Back America streamlines efforts and resources from the Department’s Organized Crime Drug Enforcement Task Forces and Project Safe Neighborhoods.

    MIL OSI USA News

  • MIL-OSI USA: National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud

    Source: US State of California

    Largest Justice Department Health Care Fraud Takedown in History
    More than Doubles Prior Record of $6 Billion

    The Justice Department today announced the results of its 2025 National Health Care Fraud Takedown, which resulted in criminal charges against 324 defendants, including 96 doctors, nurse practitioners, pharmacists, and other licensed medical professionals, in 50 federal districts and 12 State Attorneys General’s Offices across the United States, for their alleged participation in various health care fraud schemes involving over $14.6 billion in intended loss. The Takedown involved federal and state law enforcement agencies across the country and represents an unprecedented effort to combat health care fraud schemes that exploit patients and taxpayers.

    Demonstrating the significant return on investment that results from health care fraud enforcement efforts, the government seized over $245 million in cash, luxury vehicles, cryptocurrency, and other assets as part of the coordinated enforcement efforts. As part of the whole-of-government approach to combating health care fraud announced today, the Centers for Medicare and Medicaid Services (CMS) also announced that it successfully prevented over $4 billion from being paid in response to false and fraudulent claims and that it suspended or revoked the billing privileges of 205 providers in the months leading up to the Takedown. Civil charges against 20 defendants for $14.2 million in alleged fraud, as well as civil settlements with 106 defendants totaling $34.3 million, were also announced as part of the Takedown.

    Today’s Takedown was led and coordinated by the Health Care Fraud Unit of the Department of Justice Criminal Division’s Fraud Section and its core partners from U.S. Attorneys’ Offices, the Department of Health and Human Services Office of Inspector General (HHS-OIG), the Federal Bureau of Investigation (FBI), and the Drug Enforcement Administration (DEA). The cases were investigated by agents from HHS-OIG, FBI, DEA, and other federal and state law enforcement agencies. The cases are being prosecuted by Health Care Fraud Strike Force teams from the Criminal Division’s Fraud Section, 50 U.S. Attorneys’ Offices nationwide, and 12 State Attorneys General Offices.

    “This record-setting Health Care Fraud Takedown delivers justice to criminal actors who prey upon our most vulnerable citizens and steal from hardworking American taxpayers,” said Attorney General Pamela Bondi. “Make no mistake – this administration will not tolerate criminals who line their pockets with taxpayer dollars while endangering the health and safety of our communities.”

    “As part of making healthcare accessible and affordable to all Americans, HHS will aggressively work with our law enforcement partners to eliminate the pervasive health care fraud that bedeviled this agency under the former administration and drove up costs,” said Secretary Robert F. Kennedy Jr. of the Department of Health and Human Services.

    “The Criminal Division is intensely committed to rooting out health care fraud schemes and prosecuting the criminals who perpetrate them because these schemes: (1) often result in physical patient harm through medically unnecessary treatments or failure to provide the correct treatments; (2) contribute to our nationwide opioid epidemic and exacerbate controlled substance addiction; and (3) do all of that while stealing money hardworking Americans contribute to pay for the care of their elders and other vulnerable citizens,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “The Division’s Health Care Fraud Unit and U.S. Attorneys’ Offices stand united with our law enforcement partners in this fight, and we will continue to use every tool at our disposal to protect the integrity of our health care programs for the American people.”

    “The scale of today’s Takedown is unprecedented, and so is the harm we’re confronting. Individuals who attempt to steal from the federal health care system and put vulnerable patients at risk will be held accountable,” said Acting Inspector General Juliet T. Hodgkins of HHS-OIG. “Our agents at HHS-OIG work relentlessly to detect, investigate, and dismantle these fraud schemes. We are proud to stand with our law enforcement partners in protecting taxpayer dollars and safeguarding patient care.”

    “Health care fraud drains critical resources from programs intended to help people who truly need medical care,” said FBI Director Kash Patel. “Today’s announcement demonstrates our commitment to pursuing those who exploit the system for personal gain. With more than $13 billion in fraud uncovered, this is the largest takedown for this initiative to date. Together, the FBI and our law enforcement partners will continue to hold those accountable who steal from the American people and undermine our health care systems.”

    Transnational Criminal Organizations

    29 defendants were charged for their roles in transnational criminal organizations alleged to have submitted over $12 billion in fraudulent claims to America’s health insurance programs.

    For instance, a nationwide investigation known as Operation Gold Rush resulted in the largest loss amount ever charged in a health care fraud case brought by the Department. These charges were announced in the Eastern District of New York, the Northern District of Illinois, the Central District of California, the Middle District of Florida, and the District of New Jersey against 19 defendants. Twelve of these defendants have been arrested, including four defendants who were apprehended in Estonia as a result of international cooperation with Estonian law enforcement and seven defendants who were arrested at U.S. airports and the U.S. border with Mexico, cutting off their intended escape routes as they attempted to avoid capture.

    The organization allegedly used a network of foreign straw owners, including individuals sent into the United States from abroad, who, acting at the direction of others using encrypted messaging and assumed identities from overseas, strategically bought dozens of medical supply companies located across the United States. They then rapidly submitted $10.6 billion in fraudulent health care claims to Medicare for urinary catheters and other durable medical equipment by exploiting the stolen identities of over one million Americans spanning all 50 states and using their confidential medical information to submit the fraudulent claims. As alleged, the organization exploited the U.S. financial system by laundering the fraudulent proceeds and deploying a range of tactics to circumvent anti-money laundering controls to transfer funds into cryptocurrency and shell companies located abroad. The arrests announced today also include a banker who facilitated the money laundering of fraud proceeds on behalf of the organization through a U.S.-based bank.

    The Health Care Fraud Unit’s Data Analytics Team and its partners detected the anomalous billing through proactive data analytics, and HHS-OIG and CMS successfully prevented the organization from receiving all but approximately $41 million of the approximately $4.45 billion that was scheduled to be paid by Medicare. HHS and CMS intend to seek to return the $4.41 billion in escrow to the Medicare trust fund for needed medical care. The scheme nonetheless resulted in payments of approximately $900 million from Medicare supplemental insurers. To date, law enforcement has seized approximately $27.7 million in fraud proceeds as part of Operation Gold Rush.

    In another action involving foreign influence, charges were filed in the Northern District of Illinois against five defendants, including two owners and executives of Pakistani marketing organizations, in connection with a $703 million scheme in which Medicare beneficiaries’ identification numbers and other confidential health information were allegedly obtained through theft and deceptive marketing. The defendants allegedly used artificial intelligence to create fake recordings of Medicare beneficiaries purportedly consenting to receive certain products. According to court documents, the beneficiaries’ confidential information was then illegally sold to laboratories and durable medical equipment companies, which used this unlawfully obtained and fraudulently generated data to submit false claims to Medicare. Certain defendants controlled dozens of nominee-owned durable medical equipment companies and laboratories that allegedly submitted fraudulent claims for products and services the beneficiaries did not request, need, or receive. Certain defendants also allegedly conspired to conceal and launder the fraud proceeds from bank accounts they controlled in the United States to bank accounts overseas. In total, the defendants caused approximately $703 million in alleged fraudulent claims to Medicare and Medicare Advantage plans, which paid approximately $418 million on those claims. The government seized approximately $44.7 million from various bank accounts related to this case.

    Finally, a defendant based in Pakistan and the United Arab Emirates who owned a billing company allegedly orchestrated a scheme to prey upon vulnerable individuals in need of addiction treatment by conspiring with treatment center owners to fraudulently bill Arizona Medicaid approximately $650 million for substance abuse treatment services. According to court documents, some of the services billed were never provided, while other services were provided at a level that was so substandard that it failed to serve any treatment purpose. As part of the conspiracy, treatment center owners allegedly paid illegal kickbacks in exchange for the referral of patients recruited from the homeless population and Native American reservations. The defendant received at least $25 million of ill-gotten Arizona Medicaid funds as a result of the conspiracy and is charged with a money laundering offense for his alleged use of those funds to purchase a $2.9 million home located on a golf estate in Dubai.

    Fraudulent Wound Care

    Charges were filed in the District of Arizona and the District of Nevada against seven defendants, including five medical professionals, in connection with approximately $1.1 billion in fraudulent claims to Medicare and other health care benefit programs for amniotic wound allografts. As alleged, certain defendants targeted vulnerable elderly patients, many of whom were receiving hospice care, and applied medically unnecessary amniotic allografts to these patients’ wounds. Many of the allografts allegedly were applied without coordination with the patients’ treating physicians, without proper treatment for infection, to superficial wounds that did not need this treatment, and to areas that far exceeded the size of the wound. Certain defendants allegedly received millions in illegal kickbacks from the fraudulent billing scheme.

    “Today’s unprecedented enforcement action demonstrates that CMS and our federal partners are united in our mission to protect the integrity of Medicare and Medicaid by crushing waste, fraud, and abuse,” said CMS Administrator Dr. Mehmet Oz. “Every dollar we prevent from going to fraudsters is a dollar that stays in the system to serve legitimate beneficiaries. Through advanced data analytics, real-time monitoring, and swift administrative action, CMS is leading the fight to protect Medicare, Medicaid, and the trust Americans place in these vital programs. We’re not waiting for fraud to happen—we’re stopping it before it starts.”

    Prescription Opioid Trafficking

    74 defendants, including 44 licensed medical professionals, were charged across 58 cases in connection with the alleged illegal diversion of over 15 million pills of prescription opioids and other controlled substances. For example, five defendants associated with one Texas pharmacy were charged with the unlawful distribution of over 3 million opioid pills. As alleged, the defendants conspired to distribute massive quantities of oxycodone, hydrocodone, and carisoprodol, which were subsequently trafficked by street-level drug dealers, generating large profits for the defendants. This coordinated action is a continuation of the Health Care Fraud Unit’s systematic approach to stopping drug trafficking organizations and their pharmaceutical wholesale suppliers, which together have fueled an epidemic of prescription opioid abuse for nearly a decade.

    DEA also announced today that in the last six months, DEA charged 93 administrative cases seeking the revocation of pharmacies, medical practitioners, and companies authority to handle and/or prescribe controlled substances.

    “Health care fraud isn’t just theft — it’s trafficking in trust. Today’s announcement shows that when doctors become drug dealers and treatment centers become profit-driven fraud rings, DEA will act,” said Acting Administrator Robert Murphy of the DEA. “We’re targeting the entire ecosystem of fraud — from pill mills in Texas to kickback clinics exploiting Native communities. If you abuse your medical license to push poison or pad your pockets, we will hold you accountable.”

    Telemedicine and Genetic Testing Fraud

    In today’s Takedown, 49 defendants were charged in connection with the submission of over $1.17 billion in allegedly fraudulent claims to Medicare resulting from telemedicine and genetic testing fraud schemes. For example, in the Southern District of Florida, prosecutors charged an owner of telemedicine and durable medical equipment companies with a $46 million scheme in which Medicare beneficiaries were allegedly targeted through deceptive telemarketing campaigns and then fraudulent claims were submitted to Medicare for durable medical equipment and genetic tests for these beneficiaries. The Department continues to focus on eliminating health care fraud schemes that depend on telemedicine, including schemes involving fraudulent claims for genetic testing, durable medical equipment, and COVID-19 tests.

    Other Health Care Fraud Schemes

    The other cases announced today charge an additional 170 defendants with various other health care fraud schemes involving over $1.84 billion in allegedly false and fraudulent claims to Medicare, Medicaid, and private insurance companies for diagnostic testing, medical visits, and treatments that were medically unnecessary, provided in connection with kickbacks and bribes, or never provided at all. For example, in the Western District of Tennessee, prosecutors charged three defendants, including business owners and a pharmacist, with a $28.7 million scheme to defraud the Federal Employees’ Compensation Fund by allegedly billing for medications for injured United States Postal Service employees that were never prescribed by a licensed practitioner and largely were not dispensed as claimed. And in the Western District of Washington and the Northern District of California, prosecutors charged medical providers with allegedly stealing fentanyl and hydrocodone, respectively, that was meant for the providers’ patients, including child patients in need of anesthesia.

    “VA’s Integrated Veteran Care Programs provide critical community-based health care to our nation’s disabled veterans and their dependents,” said Acting Inspector General David Case of the Department of Veterans Affairs Office of Inspector General (VA-OIG). “Robust oversight of VA’s health care system is one of VA-OIG’s highest priorities. VA-OIG is committed to holding accountable those who defraud government benefits programs intended to care for our nation’s heroes.”

    Breaking Down Silos in the Fight Against Health Care Fraud

    In connection with the coordinated nationwide law enforcement operation, the Department is announcing that it is working closely with HHS-OIG, FBI, and other agencies to create a Health Care Fraud Data Fusion Center to bring together experts from the Department’s Criminal Division, Fraud Section, Health Care Fraud Unit Data Analytics Team; HHS-OIG; FBI; and other agencies to leverage cloud computing, artificial intelligence, and advanced analytics to identify emerging health care fraud schemes. The Health Care Fraud Unit’s Data Analytics Team was established in 2018 to enhance the Unit’s ability to detect, investigate, and prosecute complex health care fraud schemes. Joining forces with data analysts from HHS-OIG, FBI, and other partners will increase efficiency, detection, and rapid prosecution of emerging health care fraud schemes. It will also implement the President’s Executive Order Stopping Waste, Fraud, and Abuse by Eliminating Information Silos (Exec. Order No. 14243, 3 C.F.R. 294 (2025)) by reducing duplicative data teams, increasing operational efficiency through a whole-of-government approach, and leveraging cloud computing, artificial intelligence, and other agency resources.

    Principal Assistant Deputy Chief Jacob Foster, Assistant Deputy Chief Rebecca Yuan, Trial Attorney Miriam L. Glaser Dauermann, and Data Analyst Elizabeth Nolte, all of the Health Care Fraud Unit of the Criminal Division’s Fraud Section, led and coordinated this year’s Takedown. The cases are being prosecuted by the Health Care Fraud Unit’s National Rapid Response, Florida, Gulf Coast, Los Angeles, Midwest, New England, Northeast, and Texas Strike Forces; U.S. Attorneys’ Offices for the District of Arizona, Central District of California, Northern District of California, Southern District of California, District of Columbia, District of Connecticut, District of Delaware, Middle District of Florida, Northern District of Florida, Southern District of Florida, Middle District of Georgia, District of Idaho, Northern District of Illinois, Eastern District of Kentucky, Western District of Kentucky, Eastern District of Louisiana, Middle District of Louisiana, District of Maine, District of Massachusetts, Eastern District of Michigan, Western District of Michigan, Northern District of Mississippi, Southern District of Mississippi, District of Montana, District of Nevada, District of New Hampshire, District of New Jersey, Eastern District of New York, Northern District of New York, Southern District of New York, Western District of New York, Eastern District of North Carolina, Western District of North Carolina, District of North Dakota, Northern District of Ohio, Southern District of Ohio, Northern District of Oklahoma, Western District of Oklahoma, District of Oregon, Eastern District of Pennsylvania, District of South Carolina, Middle District of Tennessee, Western District of Tennessee, Northern District of Texas, Southern District of Texas, Western District of Texas, District of Vermont, Eastern District of Virginia, Western District of Washington, and Northern District of West Virginia; and State Attorneys General’s Offices for California, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, Ohio, Pennsylvania, South Carolina, and Wisconsin. The Health Care Fraud Unit’s Data Analytics Team used cutting-edge data analytics to identify and support the investigations that led to these charges.

    In addition to FBI, HHS-OIG, DEA, and CMS, HSI, VA-OIG, IRS Criminal Investigation, Defense Criminal Investigative Service, Department of Labor, United States Postal Service Office of Inspector General, Office of Personnel Management Office of Inspector General, and other federal, state, and local law enforcement agencies participated in the operation. The Medicaid Fraud Control Units of California, the District of Columbia, Florida, Georgia, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, North Carolina, North Dakota, Ohio, Pennsylvania, South Carolina, Texas, Virginia, and Wisconsin also participated in the investigation of many of the federal and state cases announced today.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Forces. Prior to the charges announced as part of today’s nationwide Takedown and since its inception in March 2007, the Health Care Fraud Strike Force, which operates in 27 districts, charged more than 5,400 defendants who collectively billed Medicare, Medicaid, and private health insurers more than $27 billion.

    The following materials related to today’s announcement are available on the Health Care Fraud Unit’s website through these links:

    •  Graphics and Resources

    •  Case Descriptions

    •  Court Documents

    An indictment, information, or complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI Security: Pittsburgh Felon Sentenced to More Than Five Years in Prison for Possession of Firearm and Violating Conditions of Supervised Release

    Source: United States Bureau of Alcohol Tobacco Firearms and Explosives (ATF)

    PITTSBURGH, Pa. – A resident of Pittsburgh, Pennsylvania, has been sentenced in federal court to 65 months of prison on his conviction of being a felon in possession of a firearm and violating the conditions of his supervised release, Acting United States Attorney Troy Rivetti announced today.

    Senior United States District Judge David S. Cercone imposed the sentence on Raymond Young, 23, on June 27, 2025.

    According to information presented to the Court, on August 7, 2024, Glassport patrol officers stopped Young in a vehicle he was driving without a license. In preparation for towing Young’s vehicle, officers observed a firearm in the vehicle and attempted to remove Young, who then shifted the vehicle into gear and sped off, running over one officer’s feet and nearly striking another officer. Young’s vehicle came to a stop after hitting a parked vehicle. Young exited the vehicle and attempted to flee the scene on foot, but was apprehended by police.

    In the defendant’s flight path, the officers recovered a Glock pistol with an extended magazine loaded with 30 rounds of ammunition and one round in the chamber. The firearm had been reported as stolen. Young is precluded under federal law from possessing a firearm because he was previously convicted of a felony for possession of a firearm with an obliterated serial number. Young was still on federal supervised release for that offense when he was arrested by the Glassport Police on August 7, 2024.

    Assistant United States Attorney Brendan T. Conway prosecuted this case on behalf of the government.

    Acting United States Attorney Rivetti commended the Glassport Police Department and Bureau of Alcohol, Tobacco, Firearms and Explosives for the investigation leading to the successful prosecution of Young.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.

    MIL Security OSI

  • MIL-OSI Security: Eureka Chiropractor Sentenced to 20 Months in Prison and Ordered to Repay More than $2.3 Million for Defrauding Medicare

    Source: US FBI

    PEORIA, Ill. – Carrie Musselman, 48, of Eureka, Illinois, was sentenced on June 24, 2025, to 20 months in prison and ordered to pay more than $2.3 million dollars in restitution following her convictions on multiple charges related to her scheme to defraud Medicare and twelve other insurance companies. A jury found Musselman guilty of one count of healthcare fraud and five counts of wire fraud after a 13-day trial in February 2025.

    At the sentencing hearing before Senior U.S. District Judge Michael M. Mihm, the government presented evidence that Musselman, a chiropractor in Eureka, engaged in a multi-year fraud to steal more than $2.5 million from Medicare and other insurance companies. As part of the scheme, Musselman submitted fraudulent insurance claims which indicated that services had been performed by medical doctors when they were actually performed by mid-level providers. That resulted in automatic pay increases for Musselman to which she was not entitled.

    Musselman also made claims that falsely asserted patients had received services that were never provided. These claims included purportedly providing patients with allergy injections when no such injections were given. Instead, patients were sent home with oral drops that had not been approved by the Food and Drug Administration, were considered “experimental,” and had not been proven to be effective.

    And Musselman misrepresented services that were provided, again resulting in her receipt of payments to which she was not entitled. One of Musselman’s most highly reimbursed services, the placement of an electroacupuncture device, which she falsely billed as a surgically implanted neurostimulator, would not have qualified for any payment but for her deception.

    Also at the hearing, Judge Mihm found that Musselman had committed perjury in her testimony. In doing so, the judge noted that Musselman’s statements lacked credibility. He stated that Musselman was well aware of the fraud she was committing and that she had directed and encouraged the fraud. 

    “This case should serve as a warning to anyone who would commit fraud against health insurance,” said Acting United States Attorney Gregory M. Gilmore. “We will seek out fraud, waste, and abuse and prosecute those who engage in it. Providers who take advantage of the trust placed in them to line their own pockets abandon their ethical responsibilities and raise health insurance costs for vulnerable patients.”

    “The submission of false claims undermines the integrity of our federal healthcare system,” said Linda T. Hanley, Special Agent in Charge with the United States Department of Health and Human Services Office of Inspector General. “We remain committed to holding healthcare providers accountable for complying with Medicare regulations so that enrollees can continue to rely on the program and receive the care they deserve.”

    “Bad actors in healthcare, such as Dr. Musselman, think they can cover up fraud through clouded paperwork and technical healthcare jargon all while they commit illegal acts such as false claims, fraudulent services, and in this case, services not even rendered,” said Christopher J.S. Johnson, the Special Agent in Charge of the FBI Springfield Field Office. “This sentencing and ordered restitution are a testament to the FBI’s commitment to working these types of cases. It doesn’t matter how clouded the paperwork, or how many files there are to go through, if there is a victim, then there will be an agent investigating it.”

    The case investigation was conducted by the Department of Health and Human Services, Office of Inspector General, Office of Investigations, and the Federal Bureau of Investigation, Springfield Field Office. Assistant U.S. Attorneys Douglas F. McMeyer, Bryan D. Freres, and Grace J. Hitzeman represented the government at trial.

    MIL Security OSI

  • MIL-OSI Security: National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud

    Source: United States Attorneys General

    Largest Justice Department Health Care Fraud Takedown in History
    More than Doubles Prior Record of $6 Billion

    The Justice Department today announced the results of its 2025 National Health Care Fraud Takedown, which resulted in criminal charges against 324 defendants, including 96 doctors, nurse practitioners, pharmacists, and other licensed medical professionals, in 50 federal districts and 12 State Attorneys General’s Offices across the United States, for their alleged participation in various health care fraud schemes involving over $14.6 billion in intended loss. The Takedown involved federal and state law enforcement agencies across the country and represents an unprecedented effort to combat health care fraud schemes that exploit patients and taxpayers.

    Demonstrating the significant return on investment that results from health care fraud enforcement efforts, the government seized over $245 million in cash, luxury vehicles, cryptocurrency, and other assets as part of the coordinated enforcement efforts. As part of the whole-of-government approach to combating health care fraud announced today, the Centers for Medicare and Medicaid Services (CMS) also announced that it successfully prevented over $4 billion from being paid in response to false and fraudulent claims and that it suspended or revoked the billing privileges of 205 providers in the months leading up to the Takedown. Civil charges against 20 defendants for $14.2 million in alleged fraud, as well as civil settlements with 106 defendants totaling $34.3 million, were also announced as part of the Takedown.

    Today’s Takedown was led and coordinated by the Health Care Fraud Unit of the Department of Justice Criminal Division’s Fraud Section and its core partners from U.S. Attorneys’ Offices, the Department of Health and Human Services Office of Inspector General (HHS-OIG), the Federal Bureau of Investigation (FBI), and the Drug Enforcement Administration (DEA). The cases were investigated by agents from HHS-OIG, FBI, DEA, and other federal and state law enforcement agencies. The cases are being prosecuted by Health Care Fraud Strike Force teams from the Criminal Division’s Fraud Section, 50 U.S. Attorneys’ Offices nationwide, and 12 State Attorneys General Offices.

    “This record-setting Health Care Fraud Takedown delivers justice to criminal actors who prey upon our most vulnerable citizens and steal from hardworking American taxpayers,” said Attorney General Pamela Bondi. “Make no mistake – this administration will not tolerate criminals who line their pockets with taxpayer dollars while endangering the health and safety of our communities.”

    “As part of making healthcare accessible and affordable to all Americans, HHS will aggressively work with our law enforcement partners to eliminate the pervasive health care fraud that bedeviled this agency under the former administration and drove up costs,” said Secretary Robert F. Kennedy Jr. of the Department of Health and Human Services.

    “The Criminal Division is intensely committed to rooting out health care fraud schemes and prosecuting the criminals who perpetrate them because these schemes: (1) often result in physical patient harm through medically unnecessary treatments or failure to provide the correct treatments; (2) contribute to our nationwide opioid epidemic and exacerbate controlled substance addiction; and (3) do all of that while stealing money hardworking Americans contribute to pay for the care of their elders and other vulnerable citizens,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “The Division’s Health Care Fraud Unit and U.S. Attorneys’ Offices stand united with our law enforcement partners in this fight, and we will continue to use every tool at our disposal to protect the integrity of our health care programs for the American people.”

    “The scale of today’s Takedown is unprecedented, and so is the harm we’re confronting. Individuals who attempt to steal from the federal health care system and put vulnerable patients at risk will be held accountable,” said Acting Inspector General Juliet T. Hodgkins of HHS-OIG. “Our agents at HHS-OIG work relentlessly to detect, investigate, and dismantle these fraud schemes. We are proud to stand with our law enforcement partners in protecting taxpayer dollars and safeguarding patient care.”

    “Health care fraud drains critical resources from programs intended to help people who truly need medical care,” said FBI Director Kash Patel. “Today’s announcement demonstrates our commitment to pursuing those who exploit the system for personal gain. With more than $13 billion in fraud uncovered, this is the largest takedown for this initiative to date. Together, the FBI and our law enforcement partners will continue to hold those accountable who steal from the American people and undermine our health care systems.”

    Transnational Criminal Organizations

    29 defendants were charged for their roles in transnational criminal organizations alleged to have submitted over $12 billion in fraudulent claims to America’s health insurance programs.

    For instance, a nationwide investigation known as Operation Gold Rush resulted in the largest loss amount ever charged in a health care fraud case brought by the Department. These charges were announced in the Eastern District of New York, the Northern District of Illinois, the Central District of California, the Middle District of Florida, and the District of New Jersey against 19 defendants. Twelve of these defendants have been arrested, including four defendants who were apprehended in Estonia as a result of international cooperation with Estonian law enforcement and seven defendants who were arrested at U.S. airports and the U.S. border with Mexico, cutting off their intended escape routes as they attempted to avoid capture.

    The organization allegedly used a network of foreign straw owners, including individuals sent into the United States from abroad, who, acting at the direction of others using encrypted messaging and assumed identities from overseas, strategically bought dozens of medical supply companies located across the United States. They then rapidly submitted $10.6 billion in fraudulent health care claims to Medicare for urinary catheters and other durable medical equipment by exploiting the stolen identities of over one million Americans spanning all 50 states and using their confidential medical information to submit the fraudulent claims. As alleged, the organization exploited the U.S. financial system by laundering the fraudulent proceeds and deploying a range of tactics to circumvent anti-money laundering controls to transfer funds into cryptocurrency and shell companies located abroad. The arrests announced today also include a banker who facilitated the money laundering of fraud proceeds on behalf of the organization through a U.S.-based bank.

    The Health Care Fraud Unit’s Data Analytics Team and its partners detected the anomalous billing through proactive data analytics, and HHS-OIG and CMS successfully prevented the organization from receiving all but approximately $41 million of the approximately $4.45 billion that was scheduled to be paid by Medicare. HHS and CMS intend to seek to return the $4.41 billion in escrow to the Medicare trust fund for needed medical care. The scheme nonetheless resulted in payments of approximately $900 million from Medicare supplemental insurers. To date, law enforcement has seized approximately $27.7 million in fraud proceeds as part of Operation Gold Rush.

    In another action involving foreign influence, charges were filed in the Northern District of Illinois against five defendants, including two owners and executives of Pakistani marketing organizations, in connection with a $703 million scheme in which Medicare beneficiaries’ identification numbers and other confidential health information were allegedly obtained through theft and deceptive marketing. The defendants allegedly used artificial intelligence to create fake recordings of Medicare beneficiaries purportedly consenting to receive certain products. According to court documents, the beneficiaries’ confidential information was then illegally sold to laboratories and durable medical equipment companies, which used this unlawfully obtained and fraudulently generated data to submit false claims to Medicare. Certain defendants controlled dozens of nominee-owned durable medical equipment companies and laboratories that allegedly submitted fraudulent claims for products and services the beneficiaries did not request, need, or receive. Certain defendants also allegedly conspired to conceal and launder the fraud proceeds from bank accounts they controlled in the United States to bank accounts overseas. In total, the defendants caused approximately $703 million in alleged fraudulent claims to Medicare and Medicare Advantage plans, which paid approximately $418 million on those claims. The government seized approximately $44.7 million from various bank accounts related to this case.

    Finally, a defendant based in Pakistan and the United Arab Emirates who owned a billing company allegedly orchestrated a scheme to prey upon vulnerable individuals in need of addiction treatment by conspiring with treatment center owners to fraudulently bill Arizona Medicaid approximately $650 million for substance abuse treatment services. According to court documents, some of the services billed were never provided, while other services were provided at a level that was so substandard that it failed to serve any treatment purpose. As part of the conspiracy, treatment center owners allegedly paid illegal kickbacks in exchange for the referral of patients recruited from the homeless population and Native American reservations. The defendant received at least $25 million of ill-gotten Arizona Medicaid funds as a result of the conspiracy and is charged with a money laundering offense for his alleged use of those funds to purchase a $2.9 million home located on a golf estate in Dubai.

    Fraudulent Wound Care

    Charges were filed in the District of Arizona and the District of Nevada against seven defendants, including five medical professionals, in connection with approximately $1.1 billion in fraudulent claims to Medicare and other health care benefit programs for amniotic wound allografts. As alleged, certain defendants targeted vulnerable elderly patients, many of whom were receiving hospice care, and applied medically unnecessary amniotic allografts to these patients’ wounds. Many of the allografts allegedly were applied without coordination with the patients’ treating physicians, without proper treatment for infection, to superficial wounds that did not need this treatment, and to areas that far exceeded the size of the wound. Certain defendants allegedly received millions in illegal kickbacks from the fraudulent billing scheme.

    “Today’s unprecedented enforcement action demonstrates that CMS and our federal partners are united in our mission to protect the integrity of Medicare and Medicaid by crushing waste, fraud, and abuse,” said CMS Administrator Dr. Mehmet Oz. “Every dollar we prevent from going to fraudsters is a dollar that stays in the system to serve legitimate beneficiaries. Through advanced data analytics, real-time monitoring, and swift administrative action, CMS is leading the fight to protect Medicare, Medicaid, and the trust Americans place in these vital programs. We’re not waiting for fraud to happen—we’re stopping it before it starts.”

    Prescription Opioid Trafficking

    74 defendants, including 44 licensed medical professionals, were charged across 58 cases in connection with the alleged illegal diversion of over 15 million pills of prescription opioids and other controlled substances. For example, five defendants associated with one Texas pharmacy were charged with the unlawful distribution of over 3 million opioid pills. As alleged, the defendants conspired to distribute massive quantities of oxycodone, hydrocodone, and carisoprodol, which were subsequently trafficked by street-level drug dealers, generating large profits for the defendants. This coordinated action is a continuation of the Health Care Fraud Unit’s systematic approach to stopping drug trafficking organizations and their pharmaceutical wholesale suppliers, which together have fueled an epidemic of prescription opioid abuse for nearly a decade.

    DEA also announced today that in the last six months, DEA charged 93 administrative cases seeking the revocation of pharmacies, medical practitioners, and companies authority to handle and/or prescribe controlled substances.

    “Health care fraud isn’t just theft — it’s trafficking in trust. Today’s announcement shows that when doctors become drug dealers and treatment centers become profit-driven fraud rings, DEA will act,” said Acting Administrator Robert Murphy of the DEA. “We’re targeting the entire ecosystem of fraud — from pill mills in Texas to kickback clinics exploiting Native communities. If you abuse your medical license to push poison or pad your pockets, we will hold you accountable.”

    Telemedicine and Genetic Testing Fraud

    In today’s Takedown, 49 defendants were charged in connection with the submission of over $1.17 billion in allegedly fraudulent claims to Medicare resulting from telemedicine and genetic testing fraud schemes. For example, in the Southern District of Florida, prosecutors charged an owner of telemedicine and durable medical equipment companies with a $46 million scheme in which Medicare beneficiaries were allegedly targeted through deceptive telemarketing campaigns and then fraudulent claims were submitted to Medicare for durable medical equipment and genetic tests for these beneficiaries. The Department continues to focus on eliminating health care fraud schemes that depend on telemedicine, including schemes involving fraudulent claims for genetic testing, durable medical equipment, and COVID-19 tests.

    Other Health Care Fraud Schemes

    The other cases announced today charge an additional 170 defendants with various other health care fraud schemes involving over $1.84 billion in allegedly false and fraudulent claims to Medicare, Medicaid, and private insurance companies for diagnostic testing, medical visits, and treatments that were medically unnecessary, provided in connection with kickbacks and bribes, or never provided at all. For example, in the Western District of Tennessee, prosecutors charged three defendants, including business owners and a pharmacist, with a $28.7 million scheme to defraud the Federal Employees’ Compensation Fund by allegedly billing for medications for injured United States Postal Service employees that were never prescribed by a licensed practitioner and largely were not dispensed as claimed. And in the Western District of Washington and the Northern District of California, prosecutors charged medical providers with allegedly stealing fentanyl and hydrocodone, respectively, that was meant for the providers’ patients, including child patients in need of anesthesia.

    “VA’s Integrated Veteran Care Programs provide critical community-based health care to our nation’s disabled veterans and their dependents,” said Acting Inspector General David Case of the Department of Veterans Affairs Office of Inspector General (VA-OIG). “Robust oversight of VA’s health care system is one of VA-OIG’s highest priorities. VA-OIG is committed to holding accountable those who defraud government benefits programs intended to care for our nation’s heroes.”

    Breaking Down Silos in the Fight Against Health Care Fraud

    In connection with the coordinated nationwide law enforcement operation, the Department is announcing that it is working closely with HHS-OIG, FBI, and other agencies to create a Health Care Fraud Data Fusion Center to bring together experts from the Department’s Criminal Division, Fraud Section, Health Care Fraud Unit Data Analytics Team; HHS-OIG; FBI; and other agencies to leverage cloud computing, artificial intelligence, and advanced analytics to identify emerging health care fraud schemes. The Health Care Fraud Unit’s Data Analytics Team was established in 2018 to enhance the Unit’s ability to detect, investigate, and prosecute complex health care fraud schemes. Joining forces with data analysts from HHS-OIG, FBI, and other partners will increase efficiency, detection, and rapid prosecution of emerging health care fraud schemes. It will also implement the President’s Executive Order Stopping Waste, Fraud, and Abuse by Eliminating Information Silos (Exec. Order No. 14243, 3 C.F.R. 294 (2025)) by reducing duplicative data teams, increasing operational efficiency through a whole-of-government approach, and leveraging cloud computing, artificial intelligence, and other agency resources.

    Principal Assistant Deputy Chief Jacob Foster, Assistant Deputy Chief Rebecca Yuan, Trial Attorney Miriam L. Glaser Dauermann, and Data Analyst Elizabeth Nolte, all of the Health Care Fraud Unit of the Criminal Division’s Fraud Section, led and coordinated this year’s Takedown. The cases are being prosecuted by the Health Care Fraud Unit’s National Rapid Response, Florida, Gulf Coast, Los Angeles, Midwest, New England, Northeast, and Texas Strike Forces; U.S. Attorneys’ Offices for the District of Arizona, Central District of California, Northern District of California, Southern District of California, District of Columbia, District of Connecticut, District of Delaware, Middle District of Florida, Northern District of Florida, Southern District of Florida, Middle District of Georgia, District of Idaho, Northern District of Illinois, Eastern District of Kentucky, Western District of Kentucky, Eastern District of Louisiana, Middle District of Louisiana, District of Maine, District of Massachusetts, Eastern District of Michigan, Western District of Michigan, Northern District of Mississippi, Southern District of Mississippi, District of Montana, District of Nevada, District of New Hampshire, District of New Jersey, Eastern District of New York, Northern District of New York, Southern District of New York, Western District of New York, Eastern District of North Carolina, Western District of North Carolina, District of North Dakota, Northern District of Ohio, Southern District of Ohio, Northern District of Oklahoma, Western District of Oklahoma, District of Oregon, Eastern District of Pennsylvania, District of South Carolina, Middle District of Tennessee, Western District of Tennessee, Northern District of Texas, Southern District of Texas, Western District of Texas, District of Vermont, Eastern District of Virginia, Western District of Washington, and Northern District of West Virginia; and State Attorneys General’s Offices for California, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, Ohio, Pennsylvania, South Carolina, and Wisconsin. The Health Care Fraud Unit’s Data Analytics Team used cutting-edge data analytics to identify and support the investigations that led to these charges.

    In addition to FBI, HHS-OIG, DEA, and CMS, HSI, VA-OIG, IRS Criminal Investigation, Defense Criminal Investigative Service, Department of Labor, United States Postal Service Office of Inspector General, Office of Personnel Management Office of Inspector General, and other federal, state, and local law enforcement agencies participated in the operation. The Medicaid Fraud Control Units of California, the District of Columbia, Florida, Georgia, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, North Carolina, North Dakota, Ohio, Pennsylvania, South Carolina, Texas, Virginia, and Wisconsin also participated in the investigation of many of the federal and state cases announced today.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Forces. Prior to the charges announced as part of today’s nationwide Takedown and since its inception in March 2007, the Health Care Fraud Strike Force, which operates in 27 districts, charged more than 5,400 defendants who collectively billed Medicare, Medicaid, and private health insurers more than $27 billion.

    The following materials related to today’s announcement are available on the Health Care Fraud Unit’s website through these links:

    •  Graphics and Resources

    •  Case Descriptions

    •  Court Documents

    An indictment, information, or complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud

    Source: United States Attorneys General

    Largest Justice Department Health Care Fraud Takedown in History
    More than Doubles Prior Record of $6 Billion

    The Justice Department today announced the results of its 2025 National Health Care Fraud Takedown, which resulted in criminal charges against 324 defendants, including 96 doctors, nurse practitioners, pharmacists, and other licensed medical professionals, in 50 federal districts and 12 State Attorneys General’s Offices across the United States, for their alleged participation in various health care fraud schemes involving over $14.6 billion in intended loss. The Takedown involved federal and state law enforcement agencies across the country and represents an unprecedented effort to combat health care fraud schemes that exploit patients and taxpayers.

    Demonstrating the significant return on investment that results from health care fraud enforcement efforts, the government seized over $245 million in cash, luxury vehicles, cryptocurrency, and other assets as part of the coordinated enforcement efforts. As part of the whole-of-government approach to combating health care fraud announced today, the Centers for Medicare and Medicaid Services (CMS) also announced that it successfully prevented over $4 billion from being paid in response to false and fraudulent claims and that it suspended or revoked the billing privileges of 205 providers in the months leading up to the Takedown. Civil charges against 20 defendants for $14.2 million in alleged fraud, as well as civil settlements with 106 defendants totaling $34.3 million, were also announced as part of the Takedown.

    Today’s Takedown was led and coordinated by the Health Care Fraud Unit of the Department of Justice Criminal Division’s Fraud Section and its core partners from U.S. Attorneys’ Offices, the Department of Health and Human Services Office of Inspector General (HHS-OIG), the Federal Bureau of Investigation (FBI), and the Drug Enforcement Administration (DEA). The cases were investigated by agents from HHS-OIG, FBI, DEA, and other federal and state law enforcement agencies. The cases are being prosecuted by Health Care Fraud Strike Force teams from the Criminal Division’s Fraud Section, 50 U.S. Attorneys’ Offices nationwide, and 12 State Attorneys General Offices.

    “This record-setting Health Care Fraud Takedown delivers justice to criminal actors who prey upon our most vulnerable citizens and steal from hardworking American taxpayers,” said Attorney General Pamela Bondi. “Make no mistake – this administration will not tolerate criminals who line their pockets with taxpayer dollars while endangering the health and safety of our communities.”

    “As part of making healthcare accessible and affordable to all Americans, HHS will aggressively work with our law enforcement partners to eliminate the pervasive health care fraud that bedeviled this agency under the former administration and drove up costs,” said Secretary Robert F. Kennedy Jr. of the Department of Health and Human Services.

    “The Criminal Division is intensely committed to rooting out health care fraud schemes and prosecuting the criminals who perpetrate them because these schemes: (1) often result in physical patient harm through medically unnecessary treatments or failure to provide the correct treatments; (2) contribute to our nationwide opioid epidemic and exacerbate controlled substance addiction; and (3) do all of that while stealing money hardworking Americans contribute to pay for the care of their elders and other vulnerable citizens,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. “The Division’s Health Care Fraud Unit and U.S. Attorneys’ Offices stand united with our law enforcement partners in this fight, and we will continue to use every tool at our disposal to protect the integrity of our health care programs for the American people.”

    “The scale of today’s Takedown is unprecedented, and so is the harm we’re confronting. Individuals who attempt to steal from the federal health care system and put vulnerable patients at risk will be held accountable,” said Acting Inspector General Juliet T. Hodgkins of HHS-OIG. “Our agents at HHS-OIG work relentlessly to detect, investigate, and dismantle these fraud schemes. We are proud to stand with our law enforcement partners in protecting taxpayer dollars and safeguarding patient care.”

    “Health care fraud drains critical resources from programs intended to help people who truly need medical care,” said FBI Director Kash Patel. “Today’s announcement demonstrates our commitment to pursuing those who exploit the system for personal gain. With more than $13 billion in fraud uncovered, this is the largest takedown for this initiative to date. Together, the FBI and our law enforcement partners will continue to hold those accountable who steal from the American people and undermine our health care systems.”

    Transnational Criminal Organizations

    29 defendants were charged for their roles in transnational criminal organizations alleged to have submitted over $12 billion in fraudulent claims to America’s health insurance programs.

    For instance, a nationwide investigation known as Operation Gold Rush resulted in the largest loss amount ever charged in a health care fraud case brought by the Department. These charges were announced in the Eastern District of New York, the Northern District of Illinois, the Central District of California, the Middle District of Florida, and the District of New Jersey against 19 defendants. Twelve of these defendants have been arrested, including four defendants who were apprehended in Estonia as a result of international cooperation with Estonian law enforcement and seven defendants who were arrested at U.S. airports and the U.S. border with Mexico, cutting off their intended escape routes as they attempted to avoid capture.

    The organization allegedly used a network of foreign straw owners, including individuals sent into the United States from abroad, who, acting at the direction of others using encrypted messaging and assumed identities from overseas, strategically bought dozens of medical supply companies located across the United States. They then rapidly submitted $10.6 billion in fraudulent health care claims to Medicare for urinary catheters and other durable medical equipment by exploiting the stolen identities of over one million Americans spanning all 50 states and using their confidential medical information to submit the fraudulent claims. As alleged, the organization exploited the U.S. financial system by laundering the fraudulent proceeds and deploying a range of tactics to circumvent anti-money laundering controls to transfer funds into cryptocurrency and shell companies located abroad. The arrests announced today also include a banker who facilitated the money laundering of fraud proceeds on behalf of the organization through a U.S.-based bank.

    The Health Care Fraud Unit’s Data Analytics Team and its partners detected the anomalous billing through proactive data analytics, and HHS-OIG and CMS successfully prevented the organization from receiving all but approximately $41 million of the approximately $4.45 billion that was scheduled to be paid by Medicare. HHS and CMS intend to seek to return the $4.41 billion in escrow to the Medicare trust fund for needed medical care. The scheme nonetheless resulted in payments of approximately $900 million from Medicare supplemental insurers. To date, law enforcement has seized approximately $27.7 million in fraud proceeds as part of Operation Gold Rush.

    In another action involving foreign influence, charges were filed in the Northern District of Illinois against five defendants, including two owners and executives of Pakistani marketing organizations, in connection with a $703 million scheme in which Medicare beneficiaries’ identification numbers and other confidential health information were allegedly obtained through theft and deceptive marketing. The defendants allegedly used artificial intelligence to create fake recordings of Medicare beneficiaries purportedly consenting to receive certain products. According to court documents, the beneficiaries’ confidential information was then illegally sold to laboratories and durable medical equipment companies, which used this unlawfully obtained and fraudulently generated data to submit false claims to Medicare. Certain defendants controlled dozens of nominee-owned durable medical equipment companies and laboratories that allegedly submitted fraudulent claims for products and services the beneficiaries did not request, need, or receive. Certain defendants also allegedly conspired to conceal and launder the fraud proceeds from bank accounts they controlled in the United States to bank accounts overseas. In total, the defendants caused approximately $703 million in alleged fraudulent claims to Medicare and Medicare Advantage plans, which paid approximately $418 million on those claims. The government seized approximately $44.7 million from various bank accounts related to this case.

    Finally, a defendant based in Pakistan and the United Arab Emirates who owned a billing company allegedly orchestrated a scheme to prey upon vulnerable individuals in need of addiction treatment by conspiring with treatment center owners to fraudulently bill Arizona Medicaid approximately $650 million for substance abuse treatment services. According to court documents, some of the services billed were never provided, while other services were provided at a level that was so substandard that it failed to serve any treatment purpose. As part of the conspiracy, treatment center owners allegedly paid illegal kickbacks in exchange for the referral of patients recruited from the homeless population and Native American reservations. The defendant received at least $25 million of ill-gotten Arizona Medicaid funds as a result of the conspiracy and is charged with a money laundering offense for his alleged use of those funds to purchase a $2.9 million home located on a golf estate in Dubai.

    Fraudulent Wound Care

    Charges were filed in the District of Arizona and the District of Nevada against seven defendants, including five medical professionals, in connection with approximately $1.1 billion in fraudulent claims to Medicare and other health care benefit programs for amniotic wound allografts. As alleged, certain defendants targeted vulnerable elderly patients, many of whom were receiving hospice care, and applied medically unnecessary amniotic allografts to these patients’ wounds. Many of the allografts allegedly were applied without coordination with the patients’ treating physicians, without proper treatment for infection, to superficial wounds that did not need this treatment, and to areas that far exceeded the size of the wound. Certain defendants allegedly received millions in illegal kickbacks from the fraudulent billing scheme.

    “Today’s unprecedented enforcement action demonstrates that CMS and our federal partners are united in our mission to protect the integrity of Medicare and Medicaid by crushing waste, fraud, and abuse,” said CMS Administrator Dr. Mehmet Oz. “Every dollar we prevent from going to fraudsters is a dollar that stays in the system to serve legitimate beneficiaries. Through advanced data analytics, real-time monitoring, and swift administrative action, CMS is leading the fight to protect Medicare, Medicaid, and the trust Americans place in these vital programs. We’re not waiting for fraud to happen—we’re stopping it before it starts.”

    Prescription Opioid Trafficking

    74 defendants, including 44 licensed medical professionals, were charged across 58 cases in connection with the alleged illegal diversion of over 15 million pills of prescription opioids and other controlled substances. For example, five defendants associated with one Texas pharmacy were charged with the unlawful distribution of over 3 million opioid pills. As alleged, the defendants conspired to distribute massive quantities of oxycodone, hydrocodone, and carisoprodol, which were subsequently trafficked by street-level drug dealers, generating large profits for the defendants. This coordinated action is a continuation of the Health Care Fraud Unit’s systematic approach to stopping drug trafficking organizations and their pharmaceutical wholesale suppliers, which together have fueled an epidemic of prescription opioid abuse for nearly a decade.

    DEA also announced today that in the last six months, DEA charged 93 administrative cases seeking the revocation of pharmacies, medical practitioners, and companies authority to handle and/or prescribe controlled substances.

    “Health care fraud isn’t just theft — it’s trafficking in trust. Today’s announcement shows that when doctors become drug dealers and treatment centers become profit-driven fraud rings, DEA will act,” said Acting Administrator Robert Murphy of the DEA. “We’re targeting the entire ecosystem of fraud — from pill mills in Texas to kickback clinics exploiting Native communities. If you abuse your medical license to push poison or pad your pockets, we will hold you accountable.”

    Telemedicine and Genetic Testing Fraud

    In today’s Takedown, 49 defendants were charged in connection with the submission of over $1.17 billion in allegedly fraudulent claims to Medicare resulting from telemedicine and genetic testing fraud schemes. For example, in the Southern District of Florida, prosecutors charged an owner of telemedicine and durable medical equipment companies with a $46 million scheme in which Medicare beneficiaries were allegedly targeted through deceptive telemarketing campaigns and then fraudulent claims were submitted to Medicare for durable medical equipment and genetic tests for these beneficiaries. The Department continues to focus on eliminating health care fraud schemes that depend on telemedicine, including schemes involving fraudulent claims for genetic testing, durable medical equipment, and COVID-19 tests.

    Other Health Care Fraud Schemes

    The other cases announced today charge an additional 170 defendants with various other health care fraud schemes involving over $1.84 billion in allegedly false and fraudulent claims to Medicare, Medicaid, and private insurance companies for diagnostic testing, medical visits, and treatments that were medically unnecessary, provided in connection with kickbacks and bribes, or never provided at all. For example, in the Western District of Tennessee, prosecutors charged three defendants, including business owners and a pharmacist, with a $28.7 million scheme to defraud the Federal Employees’ Compensation Fund by allegedly billing for medications for injured United States Postal Service employees that were never prescribed by a licensed practitioner and largely were not dispensed as claimed. And in the Western District of Washington and the Northern District of California, prosecutors charged medical providers with allegedly stealing fentanyl and hydrocodone, respectively, that was meant for the providers’ patients, including child patients in need of anesthesia.

    “VA’s Integrated Veteran Care Programs provide critical community-based health care to our nation’s disabled veterans and their dependents,” said Acting Inspector General David Case of the Department of Veterans Affairs Office of Inspector General (VA-OIG). “Robust oversight of VA’s health care system is one of VA-OIG’s highest priorities. VA-OIG is committed to holding accountable those who defraud government benefits programs intended to care for our nation’s heroes.”

    Breaking Down Silos in the Fight Against Health Care Fraud

    In connection with the coordinated nationwide law enforcement operation, the Department is announcing that it is working closely with HHS-OIG, FBI, and other agencies to create a Health Care Fraud Data Fusion Center to bring together experts from the Department’s Criminal Division, Fraud Section, Health Care Fraud Unit Data Analytics Team; HHS-OIG; FBI; and other agencies to leverage cloud computing, artificial intelligence, and advanced analytics to identify emerging health care fraud schemes. The Health Care Fraud Unit’s Data Analytics Team was established in 2018 to enhance the Unit’s ability to detect, investigate, and prosecute complex health care fraud schemes. Joining forces with data analysts from HHS-OIG, FBI, and other partners will increase efficiency, detection, and rapid prosecution of emerging health care fraud schemes. It will also implement the President’s Executive Order Stopping Waste, Fraud, and Abuse by Eliminating Information Silos (Exec. Order No. 14243, 3 C.F.R. 294 (2025)) by reducing duplicative data teams, increasing operational efficiency through a whole-of-government approach, and leveraging cloud computing, artificial intelligence, and other agency resources.

    Principal Assistant Deputy Chief Jacob Foster, Assistant Deputy Chief Rebecca Yuan, Trial Attorney Miriam L. Glaser Dauermann, and Data Analyst Elizabeth Nolte, all of the Health Care Fraud Unit of the Criminal Division’s Fraud Section, led and coordinated this year’s Takedown. The cases are being prosecuted by the Health Care Fraud Unit’s National Rapid Response, Florida, Gulf Coast, Los Angeles, Midwest, New England, Northeast, and Texas Strike Forces; U.S. Attorneys’ Offices for the District of Arizona, Central District of California, Northern District of California, Southern District of California, District of Columbia, District of Connecticut, District of Delaware, Middle District of Florida, Northern District of Florida, Southern District of Florida, Middle District of Georgia, District of Idaho, Northern District of Illinois, Eastern District of Kentucky, Western District of Kentucky, Eastern District of Louisiana, Middle District of Louisiana, District of Maine, District of Massachusetts, Eastern District of Michigan, Western District of Michigan, Northern District of Mississippi, Southern District of Mississippi, District of Montana, District of Nevada, District of New Hampshire, District of New Jersey, Eastern District of New York, Northern District of New York, Southern District of New York, Western District of New York, Eastern District of North Carolina, Western District of North Carolina, District of North Dakota, Northern District of Ohio, Southern District of Ohio, Northern District of Oklahoma, Western District of Oklahoma, District of Oregon, Eastern District of Pennsylvania, District of South Carolina, Middle District of Tennessee, Western District of Tennessee, Northern District of Texas, Southern District of Texas, Western District of Texas, District of Vermont, Eastern District of Virginia, Western District of Washington, and Northern District of West Virginia; and State Attorneys General’s Offices for California, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, Ohio, Pennsylvania, South Carolina, and Wisconsin. The Health Care Fraud Unit’s Data Analytics Team used cutting-edge data analytics to identify and support the investigations that led to these charges.

    In addition to FBI, HHS-OIG, DEA, and CMS, HSI, VA-OIG, IRS Criminal Investigation, Defense Criminal Investigative Service, Department of Labor, United States Postal Service Office of Inspector General, Office of Personnel Management Office of Inspector General, and other federal, state, and local law enforcement agencies participated in the operation. The Medicaid Fraud Control Units of California, the District of Columbia, Florida, Georgia, Illinois, Indiana, Louisiana, Massachusetts, Michigan, Missouri, New York, North Carolina, North Dakota, Ohio, Pennsylvania, South Carolina, Texas, Virginia, and Wisconsin also participated in the investigation of many of the federal and state cases announced today.

    The Fraud Section leads the Criminal Division’s efforts to combat health care fraud through the Health Care Fraud Strike Forces. Prior to the charges announced as part of today’s nationwide Takedown and since its inception in March 2007, the Health Care Fraud Strike Force, which operates in 27 districts, charged more than 5,400 defendants who collectively billed Medicare, Medicaid, and private health insurers more than $27 billion.

    The following materials related to today’s announcement are available on the Health Care Fraud Unit’s website through these links:

    •  Graphics and Resources

    •  Case Descriptions

    •  Court Documents

    An indictment, information, or complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI Security: Head of the Criminal Division Matthew R. Galeotti Announces Results of Health Care Fraud Takedown

    Source: United States Attorneys General

    Good morning.

    Thank you all for joining us today as we announce the largest coordinated health care fraud takedown in the history of the Department of Justice.

    Today marks a decisive moment in our fight to protect American taxpayers from fraudsters and to defend the integrity of our nation’s health care system.

    We are announcing charges against 324 defendants for their alleged participation in health care fraud schemes involving approximately $14.6 billion in false claims submitted to Medicare, Medicaid, and other health care programs.

    In a takedown this large, I can’t possibly describe all of the work that went into dismantling each scheme, but there are four key points that bear emphasizing.

    First, let me be clear about what these health care fraud schemes mean for every hardworking American family: These criminals didn’t just steal someone else’s money — they stole from you.  Every fraudulent claim, every fake billing, every kickback scheme represents money taken directly from the pockets of American taxpayers, who fund these essential programs through their hard work and sacrifice. And when criminals defraud these programs, they’re not just committing theft — they’re driving up our national deficit and threatening the long-term viability of health care for seniors, disabled Americans, and our most vulnerable citizens.

    This enforcement action involves the seizure of cash, as well as luxury vehicles and properties, returning real money to American taxpayers and to our government health care programs.

    Second, we are seeing a disturbing trend of transnational criminal organizations engaging in increasingly sophisticated and complex criminal schemes that defraud the American health care system.

    As part of this takedown, we’ve identified and charged defendants operating from Russia, Eastern Europe, Pakistan, and other foreign countries who have infiltrated our health care system to steal American taxpayer dollars.

    As one example, we dismantled a scheme involving a sophisticated operation run from Russia and Eastern Europe that strategically bought dozens of medical supply companies in the United States and submitted more than 10 billion dollars in fraudulent health care claims to Medicare. To make matters worse, these perpetrators used the stolen identities of more than one million Americans, spanning all 50 states, to submit these false claims.

    But I’m pleased to report that federal agents intercepted and arrested key members of that organization at U.S. airports and at the U.S.-Mexico border, cutting off their intended escape routes.

    The days of transnational criminal organizations using American health care programs as their personal piggy banks are over.

    Third, this takedown resulted in criminal charges against 74 defendants, including medical professionals, who fueled America’s deadly opioid epidemic for personal profit. These are not isolated instances of poor judgment. These are calculated schemes designed to exploit Americans struggling with addiction while enriching the very people who were duty-bound to help them heal.

    We charged pill mill operators who prescribed unnecessary opioids.  We dismantled networks of corrupt pharmacies that existed solely to distribute drugs to addicts and dealers, feeding the addiction crisis that has devastated so many American communities.

    This is not health care; it is a staggering breach of trust.  And under my leadership, the Criminal Division will prosecute these criminals as aggressively as we would prosecute any drug dealer — because that’s exactly what they are.

    Fourth, many of the defendants charged as part of this takedown specifically targeted some of our most vulnerable citizens: elderly Americans in nursing homes, individuals with disabilities, those battling serious illnesses, and more.  For example, our prosecutors charged seven defendants, including five medical professionals, in connection with approximately $1 billion in fraudulent claims to Medicare and other health care benefit programs for performing medically unnecessary skin grafts on dying patients as they were seeking to spend their final days with dignity and grace.

    That conduct is exactly as callous and disturbing as it sounds. Patients and their families trusted these providers with their lives.  Instead of receiving care, they became victims of elaborate criminal schemes.

    Today’s takedown marks a historic day. In addition to the tireless work of our Fraud Section’s Health Care Fraud Unit, this extraordinary effort would not have been possible without the law enforcement agencies with me here today: Health and Human Services (HHS), Centers for Medicare & Medicaid Services (CMS), Federal Bureau of Investigation (FBI), Drug Enforcement Administration (DEA).

    And of course, countless other partners across the federal, state, and local law enforcement community and dozens of United States Attorneys’ Offices. Thank you to all who made today possible.

    Despite these historic achievements, we aren’t resting on our laurels. We’re making advancements to stay ahead of criminals and their illicit schemes.

    That is why, today, I am also announcing that we are working with our partners at FBI, HHS-OIG, and other federal agencies to create a Health Care Fraud Data Fusion Center to revolutionize how we detect, investigate, and prosecute health care fraud.  These efforts will be led by the Criminal Division, specifically, the Fraud Section’s Health Care Fraud Unit and comprised of data specialists from the Unit’s Data Analytics Team. The Fusion Center will break down information silos, using coordinated data analysis to enable our investigative teams to quickly identify and dismantle emerging fraud schemes.

    This takedown represents the largest health care fraud takedown in American history.

    But it’s not the end—it’s the beginning of a new era of aggressive prosecution and data-driven prevention.

    Thank you.

    I will now turn it over to Acting Inspector General Juliet T. Hodgkins, Department of Health and Human Services Office of Inspector General.

    MIL Security OSI

  • MIL-OSI Security: Head of the Criminal Division Matthew R. Galeotti Announces Results of Health Care Fraud Takedown

    Source: United States Attorneys General

    Good morning.

    Thank you all for joining us today as we announce the largest coordinated health care fraud takedown in the history of the Department of Justice.

    Today marks a decisive moment in our fight to protect American taxpayers from fraudsters and to defend the integrity of our nation’s health care system.

    We are announcing charges against 324 defendants for their alleged participation in health care fraud schemes involving approximately $14.6 billion in false claims submitted to Medicare, Medicaid, and other health care programs.

    In a takedown this large, I can’t possibly describe all of the work that went into dismantling each scheme, but there are four key points that bear emphasizing.

    First, let me be clear about what these health care fraud schemes mean for every hardworking American family: These criminals didn’t just steal someone else’s money — they stole from you.  Every fraudulent claim, every fake billing, every kickback scheme represents money taken directly from the pockets of American taxpayers, who fund these essential programs through their hard work and sacrifice. And when criminals defraud these programs, they’re not just committing theft — they’re driving up our national deficit and threatening the long-term viability of health care for seniors, disabled Americans, and our most vulnerable citizens.

    This enforcement action involves the seizure of cash, as well as luxury vehicles and properties, returning real money to American taxpayers and to our government health care programs.

    Second, we are seeing a disturbing trend of transnational criminal organizations engaging in increasingly sophisticated and complex criminal schemes that defraud the American health care system.

    As part of this takedown, we’ve identified and charged defendants operating from Russia, Eastern Europe, Pakistan, and other foreign countries who have infiltrated our health care system to steal American taxpayer dollars.

    As one example, we dismantled a scheme involving a sophisticated operation run from Russia and Eastern Europe that strategically bought dozens of medical supply companies in the United States and submitted more than 10 billion dollars in fraudulent health care claims to Medicare. To make matters worse, these perpetrators used the stolen identities of more than one million Americans, spanning all 50 states, to submit these false claims.

    But I’m pleased to report that federal agents intercepted and arrested key members of that organization at U.S. airports and at the U.S.-Mexico border, cutting off their intended escape routes.

    The days of transnational criminal organizations using American health care programs as their personal piggy banks are over.

    Third, this takedown resulted in criminal charges against 74 defendants, including medical professionals, who fueled America’s deadly opioid epidemic for personal profit. These are not isolated instances of poor judgment. These are calculated schemes designed to exploit Americans struggling with addiction while enriching the very people who were duty-bound to help them heal.

    We charged pill mill operators who prescribed unnecessary opioids.  We dismantled networks of corrupt pharmacies that existed solely to distribute drugs to addicts and dealers, feeding the addiction crisis that has devastated so many American communities.

    This is not health care; it is a staggering breach of trust.  And under my leadership, the Criminal Division will prosecute these criminals as aggressively as we would prosecute any drug dealer — because that’s exactly what they are.

    Fourth, many of the defendants charged as part of this takedown specifically targeted some of our most vulnerable citizens: elderly Americans in nursing homes, individuals with disabilities, those battling serious illnesses, and more.  For example, our prosecutors charged seven defendants, including five medical professionals, in connection with approximately $1 billion in fraudulent claims to Medicare and other health care benefit programs for performing medically unnecessary skin grafts on dying patients as they were seeking to spend their final days with dignity and grace.

    That conduct is exactly as callous and disturbing as it sounds. Patients and their families trusted these providers with their lives.  Instead of receiving care, they became victims of elaborate criminal schemes.

    Today’s takedown marks a historic day. In addition to the tireless work of our Fraud Section’s Health Care Fraud Unit, this extraordinary effort would not have been possible without the law enforcement agencies with me here today: Health and Human Services (HHS), Centers for Medicare & Medicaid Services (CMS), Federal Bureau of Investigation (FBI), Drug Enforcement Administration (DEA).

    And of course, countless other partners across the federal, state, and local law enforcement community and dozens of United States Attorneys’ Offices. Thank you to all who made today possible.

    Despite these historic achievements, we aren’t resting on our laurels. We’re making advancements to stay ahead of criminals and their illicit schemes.

    That is why, today, I am also announcing that we are working with our partners at FBI, HHS-OIG, and other federal agencies to create a Health Care Fraud Data Fusion Center to revolutionize how we detect, investigate, and prosecute health care fraud.  These efforts will be led by the Criminal Division, specifically, the Fraud Section’s Health Care Fraud Unit and comprised of data specialists from the Unit’s Data Analytics Team. The Fusion Center will break down information silos, using coordinated data analysis to enable our investigative teams to quickly identify and dismantle emerging fraud schemes.

    This takedown represents the largest health care fraud takedown in American history.

    But it’s not the end—it’s the beginning of a new era of aggressive prosecution and data-driven prevention.

    Thank you.

    I will now turn it over to Acting Inspector General Juliet T. Hodgkins, Department of Health and Human Services Office of Inspector General.

    MIL Security OSI