Category: Security

  • MIL-OSI Security: Dominican National Indicted for Illegal Reentry

    Source: Office of United States Attorneys

    BOSTON – A Dominican national was arraigned yesterday for unlawfully reentering the United States after deportation.

    Melvin Villar, 60, of Lawrence, Mass., was charged with one count of unlawful reentry of a deported alien.

    Villar was arrested by immigration authorities on Feb. 2, 2025, at the Essex County House of Correction in Middleton. Villar was previously convicted of unlawful reentry in February 2021 in U.S. District Court in Massachusetts.  

    The charge of unlawful reentry of a deported alien provides for a sentence of up to 20 years in prison, three years of supervised release and a fine of up to $250,000. The defendant will be subject to deportation upon completion of any sentence imposed. Sentences are imposed by a federal district court judge based upon the U.S. Sentencing Guidelines and statutes which govern the determination of a sentence in a criminal case.

    United States Attorney Leah B. Foley and Patricia H. Hyde, Field Office Director of U.S. Immigration and Customs Enforcement’s Enforcement and Removal Operations in Boston made the announcement. Assistant U.S. Attorney Mark Grady of the Major Crimes Unit is prosecuting the case.

    The details contained in the charging documents are allegations. The defendant is presumed innocent unless and until proven guilty beyond a reasonable doubt in a court of law.
     

    MIL Security OSI

  • MIL-OSI Security: U.S. Attorney General Pam Bondi Appoints Steven D. Weinhoeft as Interim U.S. Attorney for the Southern District of Illinois

    Source: Office of United States Attorneys

    FAIRVIEW HEIGHTS, Ill. – U.S. Attorney General Pamela Bondi has appointed Steven D. Weinhoeft to serve as Interim U.S. Attorney for the Southern District of Illinois. Weinhoeft, returns to the role he held from 2018 to 2022, bringing decades of experience in federal law enforcement and complex litigation to the position.

    “I am honored and excited to return to this role to serve the people of the Southern District of Illinois,” said Weinhoeft. “I look forward to working with Attorney General Bondi, our talented team, and our law enforcement partners to uphold the rule of law with integrity and resolve.”

    Weinhoeft has served in the U.S. Attorney’s Office for the Southern District of Illinois since February 2008, holding multiple leadership roles, including United States Attorney (2018–2022), First Assistant U.S. Attorney, Chief of the Criminal Division, and Supervisor of the Organized Crime Drug Enforcement Task Force and Dangerous Drugs Division.

    Weinhoeft has built a career spanning nearly 29 years. Before joining the U.S. Attorney’s Office, he spent more than a decade at the Sangamon County (Ill.) State’s Attorney’s Office, including serving as its First Assistant State’s Attorney and Chief of the Criminal Division. He has significant trial experience, and his expertise includes broad areas of state and federal law, including violent crime, multi-district and international drug conspiracies, public corruption, national security, and complex financial crimes. He has technical experience serving as the office’s criminal Computer Hacking and Intellectual Property Coordinator. He also serves as the Digital Asset Coordinator with specialized expertise in cryptocurrency and blockchain issues.

    The Southern District of Illinois covers 38 counties in southern Illinois and serves approximately 1.2 million people. The district has offices in East St. Louis, Benton, and Fairview Heights.

    As U.S. Attorney, Weinhoeft will again serve as the chief federal law enforcement official representing the United States in all civil and criminal litigation. His appointment took effect on Feb. 28, 2025, and he was formally sworn into the position by Chief United States District Judge Nancy J. Rosenstengel at a ceremony Monday.

    MIL Security OSI

  • MIL-OSI Security: Five-Time Deported Mexican National Arrested in New Braunfels

    Source: Office of United States Attorneys

    SAN ANTONIO – A Mexican national was arrested in San Antonio on criminal charges related to his alleged illegal re-entry.

    According to court documents, Jose Guadalupe Deciga-Lopez was arrested during a vehicle stop in New Braunfels on March 3. Immigration records reflect Deciga-Lopez had been previously removed from the U.S. to Mexico once in 2014, twice in 2017, again in 2018 and, most recently, in 2023.

    If convicted, Deciga-Lopez faces up to 10 years in federal prison and a maximum $250,000 fine. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    Acting U.S. Attorney Margaret Leachman for the Western District of Texas made the announcement.

    Immigrations and Customs Enforcement’s (ICE) Enforcement and Removal Operations (ERO) is investigating the case.

    Special Assistant U.S. Attorney Anne Marie Cordova is prosecuting the case.

    A criminal complaint is merely an allegation and all defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    ###

    MIL Security OSI

  • MIL-OSI New Zealand: Police follow new lead in West Coast cold case investigation

    Source: New Zealand Police (National News)

    Tasman Police are following a new lead believed to be the last sighting of David John Robinson before his execution-style murder in 1998.

    The new last sighting, and other new leads, has breathed renewed energy into the 26 year-old investigation.

    The homicide investigation was launched on 28 December after 25-year-old David’s body was located on a remote West Coast beach near Ross. The investigation remained open but unresolved, until Police reopened the investigation in mid-February.

    And the investigation team has been making progress.

    Detective Inspector Geoff Baber says after conducting further interviews and new information coming to light, Police have identified new avenues and opportunities to solve David’s murder.

    “We have spoken with a witness who reports they saw David on a street corner at the northern end of Bold Head Road near Kakapotahi, a day before the single reported gunshot was heard through the area between 14 and 18 December.

    “They have also reported seeing David in the passenger seat of a green coloured 4×4 vehicle travelling in the settlement hours following the street corner sighting.”

    This information is crucial as David’s last movements were never confirmed in the original investigation.

    “We now have a better understanding of his whereabouts and can confirm he was in the Kakapotahi area in the lead up to his death,” says Detective Inspector Baber.

    Before this new information, the last confirmed sighting of David was in the beginning of November 1998 when he was arrested by Police in Haast for theft.

    “We have a responsibility in helping David’s family find the truth behind his death, and this information brings us closer to doing so.

    “If you know who may have owned or drove a green coloured 4×4 vehicle around 1998 in the Kakapotahi and Ross areas, please do not hesitate to contact the investigation team.”

    It is not too late to provide David’s family with answers – if you know something, we encourage you to come forward and speak with us.

    If you have information that could help Police’s investigation, please email us via the Cold Case form on the New Zealand Police website, or call 105 and reference the case number 231129/2221.

    ENDS

    Issued by Police Media Centre

    MIL OSI New Zealand News

  • MIL-OSI Security: Continued appeal following death of man in Islington

    Source: United Kingdom London Metropolitan Police

    Officers investigating the death of Fredi Rivero in Islington last week are continuing to appeal for witnesses.

    Police were called to Seven Sister’s Road, close to the junction of Holloway Road at 23:35hrs on Thursday, 27 February following reports of Fredi being located with serious injuries.

    Fredi, 75 was taken to hospital where he sadly died on Friday, 28 February. His family continue to be supported by specialist officers.

    Three teenage girls, aged 14, 16 and 17 have been charged with manslaughter in connection with Fredi’s death.

    Investigating officers are now in the positon to release a CCTV image of Fredi Rivero, showing what he was last seen wearing.

    Detective Inspector Devan Taylor from Specialist Crime North said:

    “Fredi Rivero was a much loved father, whose family are devastated by his death. I also know his death has also shocked this tight-knit community.

    “Three girls have been charged in connection with this investigation and we continue at pace with our enquiries.

    “If you remember seeing Fredi or have any information which could support with the investigation, please contact us.

    Information can be submitted via the Major Incident Public Portal using the following link: https://mipp.police.uk/operation/01MPS25X45-PO1

    Alternatively, please call police on 101 with the reference CAD8184/27 Feb.

    You can also contact the independent charity Crimestoppers on 0800 555 if you want to remain anonymous.

    MIL Security OSI

  • MIL-OSI USA: ICE arrests violent criminal alien outside Northampton Prison without cooperation from prison officials

    Source: US Immigration and Customs Enforcement

    PHILADELPHIA – U.S. Immigration and Customs Enforcement arrested Amilcar Josue Villalvir Mendez, a citizen of Honduras, at the Northampton County Prison in Easton, Feb. 27. Prison officials failed to honor an immigration detainer and turn Villalvir over to ICE officials within the security of the prison, thus risking the safety of the public, the officers and Villalvir himself. Villalvir is a criminal alien with prior convictions for aggravated assault, theft by unlawful taking, possession of marijuana, speeding more than 25 MPH over the speed limit and retail theft.

    “The arrest of Amilcar Josue Villalvir Mendez highlights the crucial importance of local and federal law enforcement cooperation in ensuring public safety. Northampton County choosing to place politics over safety instead of honoring our detainer, put everyone involved at unnecessary risk,” said ICE Enforcement and Removal Operations Philadelphia acting Field Office Director Brian McShane. “We urge all jurisdictions to prioritize the safety of their residents by honoring immigration detainers and working collaboratively with us. Our commitment to enforcing immigration laws and protecting public safety remains unwavering, and we will continue to pursue justice for those who violate our nation’s laws.”

    Villalvir was arrested by the Palmer Township Police Department Sept. 27, 2021, for aggravated assault, simple assault, and harassment after police were dispatched to a residence for a report of a domestic disturbance. Villalvir pled guilty March 31, 2002, in the Northampton County Court of Common Pleas to aggravated assault and was sentenced to six to 23 months confinement. He was resentenced to one year to 23 months less two days confinement after violating the original terms.

    Villalvir was arrested again by the Palmer Township Police Department for access device fraud, theft by unlawful taking, and receiving stolen property on Feb. 26, 2024. His girlfriend, the previous assault victim, died of a drug overdose Oct. 29, 2023, and the next day, just hours after she had passed away, Villalvir was observed on video surveillance withdrawing money from her bank account at an ATM. Villalvir pled guilty to theft by unlawful taking in the Northampton County Magisterial District Court.

    Members of the public with information can report crimes or suspicious activity by dialing the ICE Tip Line at 866-DHS-2-ICE (866-347-2423) or completing the online tip form.

    Learn more about ICE Philadelphia’s mission to increase public safety in our Pennsylvania, Delaware and West Virginia communities on X: @EROPhiladelphia

    MIL OSI USA News

  • MIL-OSI USA: Illegal alien indicted for conspiracy to transport other aliens and possession with intent to distribute heroin, following ICE, joint law enforcement partner investigation

    Source: US Immigration and Customs Enforcement

    PHOENIX, Ariz. – Last week, a grand jury returned an indictment against Edgar Guadalupe Jimenez-Aguilar, an illegal alien living in Phoenix, for conspiracy to transport illegal aliens and possession with intent to distribute heroin, following an investigation by U.S. Immigration and Customs Enforcement, United States Border Patrol Alien Smuggling Unit – Tucson Sector, Casa Grande, Pinal and Pima County Sheriff Departments and other law enforcement partners.

    ICE and United States Border Patrol agents identified Jimenez-Aguilar as a load driver who picked up illegal aliens in desert areas in Pinal and Pima Counties and transported them to Phoenix. Jimenez-Aguilar also operated a stash house in Phoenix used to harbor the aliens and assumed a coordinator role by recruiting others to act as load drivers.

    “This indictment highlights the disturbing reality that individuals like Jimenez-Aquilar are prioritizing personal profit over human lives. By trafficking heroin and exploiting vulnerable individuals through illegal smuggling operations, he has shown a blatant disregard for the safety and well-being of others,” said ICE Homeland Security Investigations Arizona Special Agent in Charge Francisco B. Burrola. “ICE is committed to working with our law enforcement partners to disrupt these dangerous networks and ensure that those who exploit people for financial gain are brought to justice.”

    From late 2024 through January 2025, agents interviewed other load drivers arrested for transporting illegal aliens, who admitted Jimenez-Aguilar had recruited them. The agents also conducted surveillance on Jimenez-Aguilar and his stash house. On Oct. 3, 2024, officers with the Tohono O’odham Police Department stopped a vehicle and determined four passengers, including two in the trunk of the vehicle, were aliens who were in the United States illegally.

    Officers learned that the driver had been recruited on social media, had participated in multiple prior smuggling ventures, and had been to Jimenez-Aguilar’s stash house to unload the aliens. On Jan. 28, agents stopped a Jeep Grand Cherokee in Mesa and identified the driver as Jimenez-Aguilar via his Sonoran driver’s license. Inside the vehicle, agents located approximately 297 grams of black tar heroin.

    Possession with intent to distribute heroin carries a minimum penalty of five years and up to 40 years in prison, as well as a fine of up to $5,000,000. Conspiracy to transport illegal aliens carries a maximum penalty of 10 years in prison and a fine of up to $250,000.

    An indictment is simply a method by which a person is charged with criminal activity and raises no inference of guilt. An individual is presumed innocent until evidence is presented to a jury that establishes guilt beyond a reasonable doubt.

    Assistant U.S. Attorney Vanessa Kubota, District of Arizona, Phoenix, is handling the prosecution.

    Report suspicious criminal activity to the ICE Tip Line 24 hours a day, 7 days a week at 866-DHS-2-ICE (866-347-2423).

    MIL OSI USA News

  • MIL-OSI Security: Watson Lake — Watson Lake RCMP locate stolen vehicle, make an arrest

    Source: Royal Canadian Mounted Police

    Following an investigation involving collaboration between the Whitehorse, Teslin and Watson Lake RCMP detachments, an RCMP officer from Watson Lake successfully used a tire deflation device, resulting in the arrest of a suspect in a vehicle theft.

    On March 3, 2025 at 3:28 pm Whitehorse RCMP received a report of a stolen vehicle. The vehicle was located on the Alaska Highway driving south through Teslin. Traffic stops were initiated by both the Teslin and Watson Lake RCMP however the vehicle failed to stop for police.

    A Watson Lake officer set up a tire deflation device at the Alaska and Cassiar Highway Junction in order to stop the vehicle safely. While in the action of deploying the device, the suspect vehicle swerved at the officer who was able to escape from the path of the vehicle. The suspect vehicle continued south and the driver attempted to flee once the vehicle was disabled; he eventually gave up to police commands when hampered by the deep snow. He was taken into custody without further incident.

    38-year-old Corey Letendre, a resident of Alberta was charged with the following offences under the Criminal Code of Canada: Theft of a motor vehicle, dangerous operation of a motor vehicle, assault on a police officer with a weapon (a motor vehicle) and pursuit involved flight from the police. Mr. Letendre has been remanded and set to attend court in Whitehorse on March 6, 2025.

    MIL Security OSI

  • MIL-OSI Security: Two men charged with murder of man in 1984

    Source: United Kingdom London Metropolitan Police

    Two men have been charged with murder in connection with an investigation into the death of Anthony Littler in 1984.

    Anthony Littler, 45 was found with serious injuries close to East End Road, Each Finchley on 1 May 1984. He sadly died at the scene.

    Enquiries into Anthony’s death have remained ongoing within Met Police’s Specialist Crime Unit and his family continue to be supported.

    Two men were originally arrested on Thursday, 21 March 2024.

    Michael Stewart, 55 (11.04.1969) of Station Road, EN5 and Anthony Stewart, 59 (19.11.1965) of Old Farm Road, N29 have since been charged with murder.

    They have been remanded into custody and will appear at Willesden Magistrates Court on Thursday, 6 March.

    Three men who were previously arrested on suspicion of murder remain under investigation.

    MIL Security OSI

  • MIL-OSI USA: Luján Introduces Legislation to Modernize Broken Mining Law, Protect Public Lands and Taxpayers

    US Senate News:

    Source: US Senator for New Mexico Ben Ray Luján

    Luján Bill Would Update the 1872 Mining Law Which Has Led to Significant Waste, Fraud, and Abuse

    Washington, D.C. – Today, U.S. Senator Ben Ray Luján (D-N.M.) introduced the Mining Waste, Fraud, and Abuse Prevention Act of 2025, legislation that would reform the broken 1872 Mining Law. Failure to update the 1872 Mining Law has allowed mining companies to exploit public resources for free, pass environmental costs onto taxpayers, and engage in speculation with minimal government oversight. Congressman Raúl Grijalva (D-Ariz.) leads companion legislation in the House.

    Senator Luján’s bill would update the 153-year-old law by eliminating patenting of federal lands, imposing a federal minerals royalty, establishing a Hardrock Minerals Reclamation Fund for the cleanup of abandoned mines, and requiring a review of certain lands within three years to determine if they should be available for future mining claims.

    “Elon Musk and President Trump are putting a chainsaw to our federal workforce and public lands protections. If Republicans were serious about eliminating waste, fraud, and abuse, they would join me in reforming this Civil War-era mining law that has allowed mining companies to exploit our gold, silver, and critical minerals from public lands without paying their fair share and stiffing the American taxpayer with the cleanup costs. It’s far past time that we update this law to crack down on actual waste, fraud, and abuse,” said Senator Luján. “I am proud to lead this legislation to modernize the broken 1872 Mining Law to reduce waste, protect taxpayers, generate revenue, and protect public lands. I look forward to working with my colleagues to get this legislation passed.”

    “For more than a century and a half, the mining industry has operated under an outdated, free-for-all system that gives them carte blanche to pollute and destroy, while American taxpayers get stuck with the cleanup bill. Under the Mining Law of 1872, foreign-owned companies, even companies controlled by our adversaries with egregious track records of human rights abuses and environmental harms, can mine our publicly-owned minerals. These companies then ship our minerals abroad without paying a cent back to the American people or even committing for these minerals to support the U.S. economy. It’s past time to reject this harmful status quo and move forward with commonsense reforms that protect Americans and ensure a more responsible, accountable mining industry that actually benefits Americans,” said Representative Grijalva. “Securing the minerals we need for our clean energy future cannot come at the cost of our environment, our health and safety, or tribal sovereignty. I want to thank Senator Luján for lending his leadership to join me in this effort and encourage my colleagues on both sides of the aisle to do the same.”

    Specifically, the Mining Waste, Fraud, and Abuse Prevention Act of 2025 would:

    • Require annual rental payments for claimed public land, thereby treating mine operators as other public land users.
    • Set a royalty rate of not less than 5% and not greater than 8% based on the gross income of production on federal land but would not apply to mining operations already in commercial production or those with an approved plan of operations.
    • Revenues would be deposited into a Hardrock Minerals Reclamation Fund for abandoned mine cleanup. Additionally, the Fund would be infused by an abandoned mine reclamation fee of 1% to 3%.
    • Allow the Secretary of the Interior to grant royalty relief to mining operations based on economic factors.
    • Require an exploration permit and mining operations permit for non-casual mining operations on federal land, which would be valid for 30 years and continue as long as commercial production occurs.
    • Permit states, political subdivisions, and tribes to petition the Secretary of the Interior to have lands withdrawn from mining.
    • Require an expedited review of areas that may be inappropriate for mining, and allow specific areas be reviewed for possible withdrawal.

    The Mining Law of 1872 was enacted to promote mineral exploration and development in the western United States. Today, the Civil War-era statute still guarantees broad rights to individuals and corporations, including foreign-owned, to extract minerals from public lands without payment of royalties to the federal government and constrains protections for public health and the environment.

    The legislation is cosponsored by U.S. Senators Michael Bennet (D-Colo.), Cory Booker (D-N.J.), Martin Heinrich (D-N.M.), Edward J. Markey (D-Mass.), Jeff Merkley (D-Ore.), Alex Padilla (D-Calif.), Bernie Sanders (D-Vt.), Chris Van Hollen (D-Md.), Ron Wyden (D-Ore), and Elizabeth Warren (D-Mass.).

    The legislation is supported by Earthjustice, Earthworks, Hualapai Tribe, The Wilderness Society, Natural Resources Defense Council, Grand Canyon Trust, Outdoor Alliance, Backcountry Hunters & Anglers, the National Parks Conservation Association, and Trout Unlimited.

    Endorsement quotes can be found here.

    Full bill text is available here.

    MIL OSI USA News

  • MIL-OSI United Kingdom: Council approves ambitious Budget plan

    Source: Scotland – City of Aberdeen

    New and upgraded schools, a major roads project, continuing investment in the city centre, and increased support for vulnerable and disadvantaged citizens form the basis of Aberdeen City Council’s 2025/26 Budget, which was approved today. 

    The Council is to spend £247 million on schools over the next five years, including £121m on the new Hazlehead Academy. There is a commitment to expand facilities at Harlaw Academy, refurbish St Peter’s Roman Catholic School and Ferryhill Primary, and progress an extension for Bucksburn Academy. 

    To help reduce congestion, £55 million will go to the Berryden Corridor Improvement Project, with work starting next year. In the city centre, £13m will be used to enhance the Castlegate as a public space. 

    The Budget also makes £1.534m available to the Fairer Aberdeen Fund in 2025/26, £1m through the Anti-Poverty and Inequality Committee for people struggling with the cost of living, and an extra £9.5m to deliver social care, bringing the Council’s total award to the Integration Joint Board (IJB) to £140m for the coming 12 months. 

    Councillor Alex McLellan, convener of the Finance and Resources Committee, said: “Despite the Council operating in incredibly challenging circumstances, we remain focussed on delivering essential public services and assisting people through the ongoing cost-of-living crisis. 

    “Aberdeen City Council is continuing to invest in the school estate, in roads, and other key infrastructure such as the regeneration of the city centre and beach area. 

    “These actions will ensure Aberdeen continues to be a place people want to live, want to work, want to raise a family, and want to start a business.” 

    The Budget allocates £668m to delivering public services in 2025/26 and £709m to capital projects over the next five years. 

    The Common Good Fund will help provide nearly £1.5m for to 15 external organisations for 2025/26, supporting recommendations put forward by the Culture Investment Panel.  Aberdeen Performing Arts was awarded £961,000.

    Sport Aberdeen, which operates the city’s leisure venues, will receive £4.1m for 2025/26. 

    And the Council will also fund a Cruyff Court in Kincorth – the city’s 4th – in partnership with the Denis Law Legacy Trust.  

    The gap between income and expenditure was estimated at £18.1m for 2025/26. To help address the shortfall and maintain service delivery, Council Tax is to rise by 9.85% in 2025/26. 

    For the next 12 months the Council’s Carbon Budget was set at 22,567 tonnes of carbon dioxide equivalent, a maximum target on the road to Next Zero emissions by 2045.  

    Actions agreed include:  

    • Completing a £19m investment in a Hydrogen Hub, a joint venture with bp to produce and distribute green hydrogen;
    • £9m to enlarge the electric vehicle charging network. 

    MIL OSI United Kingdom

  • MIL-OSI United Kingdom: Plans for city’s fourth Cruyff Court announced

    Source: Scotland – City of Aberdeen

    Aberdeen’s fourth Cruyff Court will be constructed in Kincorth, it was announced today (5 March) at the Full Council Budget meeting.

    The court will be built on pitches close to the site of the former Kincorth Academy building as part of the ongoing successful partnership comprising Aberdeen City Council, The Denis Law Legacy Trust and The Cruyff Foundation.

    The new facility, once completed, will provide a space for multiple sports that will be free for the local community to use.

    Aberdeen is already one of only two UK cities, the other being London, that has three Cruyff Courts. This additional fourth court will mean the city will equal London’s four Cruyff Courts.

    Convener of Finance and Resources Committee Councillor Alex McLellan said: “This new Cruyff Court will be a real asset for the community of Kincorth and will directly benefit many young people.

    “I’m delighted that we have approved the funding today for what will be Aberdeen’s fourth Cruyff Court and I look forward to working with partners, and the local community, to see the project delivered.”

    Convener of Communities, Housing and Public Protection Committee Councillor Miranda Radley said: “This commitment by Aberdeen City Council, to deliver a Cruyff Court in Kincorth, will be a huge benefit to the young people in the area and I look forward to this free to access, accessible sports facility, being delivered for the community of Kincorth.”

    Mark Williams, Chief Operating Officer of the Denis Law Legacy Trust said: “It’s exciting to help create and introduce another impactful safe space that will help benefit thousands of people both physically and mentally whilst supporting young people to grow and enjoy friendships at the same time”

    David Suttie, Trustee of the Denis Law Legacy Trust said: “The previous 3 Courts in the city have made a big difference in their communities.  The Partnership with Aberdeen City Councill, the Johan Cruyff Foundation and ourselves continues to be very successful and we all look forward to delivering something special once again.”

    Simon Wood from the Johan Cruyff Foundation said: “It’s great to work with long time partners Denis Law Legacy Trust and Aberdeen City Council again to look at delivering a 4th Cruyff Court to Aberdeen city.”

    The Cruyff Courts are a worldwide project by The Cruyff Foundation with the aim of providing safe spaces for communities to play outside and enjoy the benefits of team games and making new friends.

    The new Cruyff Court in Kincorth will become Aberdeen’s fourth court alongside Cruyff Court Denis Law in Catherine Street, Cruyff Court Neale Cooper in Tullos and Cruyff Court Willie Miller in Tillydrone.

    MIL OSI United Kingdom

  • MIL-OSI Security: Convicted Felon Sentenced to 2 1/2 Years in Prison for Gun Crime Related to Road Rage Incident

    Source: Federal Bureau of Investigation (FBI) State Crime News

    BIRMINGHAM, Ala. – A convicted felon has been sentenced for illegal possession of a firearm, announced U.S. Attorney Prim F. Escalona and FBI Special Agent in Charge Carlton Peeples.

    U.S. District Court Judge Ann Marie Axon sentenced David Lee Hooker, 53, to 30 months in prison.  In November 2024, Hooker pleaded guilty to being a felon in possession of a firearm stemming from a road rage incident in Jefferson County.

    This sentence sends a clear message that violent and reckless behavior on our roads will not be tolerated,” U.S. Attorney Escalona said. “We will continue to work with our law enforcement partners to hold accountable those who threaten the safety of our communities and endanger innocent lives.”

    “The safety of our communities is a priority,” said Special Agent in Charge Carlton Peeples, Birmingham Division. “The strong collaboration between FBI Birmingham and our state and local law enforcement partners works as a force multiplier to remove violent offenders from the communities we protect and serve.”

    According to the plea agreement, on April 4, 2023, Hooker was involved in a road rage incident at the intersection of Bessemer Road and BY Williams Sr. Drive. Hooker’s vehicle remained stationary during two cycles of the traffic light, and the individual in the vehicle behind Hooker continued to blow their horn.  When Hooker made a left turn, he pulled to the right side of the roadway. As the driver of the second vehicle drove by, Hooker drove up beside the vehicle and pointed a firearm at the driver.  The driver of the second vehicle then pulled into a nearby parking lot. Hooker followed the driver into the parking lot where he got out of his vehicle and proceeded to walk toward the second vehicle.  A Jefferson County Sherriff’s Office Task Force Officer witnessed this and activated his emergency lights to intervene. Hooker placed the firearm into his front pocket and raised his hands above his head.  The officer recovered a Smith &Wesson 9mm pistol from Hooker.     

    The FBI investigated the case along with the Jefferson County Sheriff’s Office. Assistant U.S. Attorney Benjamin A. Keown, Sr., prosecuted the case.

    MIL Security OSI

  • MIL-OSI Security: Call for Abstracts: Conference on Radiation Protection in Medicine — X Ray Vision

    Source: International Atomic Energy Agency – IAEA

    Exchanges will include the discussion of new trends in medical uses of radiation, such as using artificial intelligence in medical imaging and therapy, which can accelerate research to reduce patient radiation doses and calls for quality assurance programmes, interdisciplinary collaboration, and consideration of ethics, patient privacy and data security. Participants will also discuss ways to help raise the voices of patients in relation to their own healthcare plan.  

    The conference will provide a platform for enhanced networking opportunities among health professionals, including physicians practising in radiological imaging, nuclear medicine and radiotherapy, referring medical practitioners, medical physicists, medical radiation technologists and regulatory authorities. 

    Contributors interested in submitting a poster for the conference can find the topics of interest here, which includes areas such as the justification for the use of radiation in medicine, radiation protection of patients and staff in various diagnostic and therapeutic modalities and in interventional procedures, learning from unintended and accidental exposures in medicine, and strengthening radiation safety culture in healthcare. 

    This year’s Radiation Protection in Medicine conference is the third in the series, with the earlier ones hosted in 2017 and 2012. 

    How to Submit an Abstract 

    The guidelines and details for the submission of abstracts are available here. More information on registration and participation is available here

    MIL Security OSI

  • MIL-OSI Global: Academic freedom and democracy under siege: how a Nobel peace prize could help defend them

    Source: The Conversation – France – By Stéphanie Balme, Director, CERI (Centre de recherches internationales), Sciences Po

    A rally for science drew a big crowd during the American Geophysical Union’s meeting in San Francisco. MarcioJoseSanchez/AP, CC BY

    March 7 has been recognized as the “Day of the Stand Up for Science Movement”, launched in 2017 in response to the anti-science actions of the first Trump administration. Under the second, attacks on scientists and scientific inquiry have escalated into a systematic assault–tantamount to a coup d’Etat against science itself.

    While Donald Trump is often portrayed as erratic, his policies in this area have followed a consistent trajectory. His new administration has once again declared ‘war’ on evidence-based national policymaking and science diplomacy in foreign affairs as evidenced by several early actions. Immediately after taking office, Donald Trump issued executive orders freezing or canceling tens of billions in research funding. All National Science Foundation projects have been halted pending review, while the National Institutes of Health faces suspensions under Health and Human Services directives. The US has withdrawn from the Paris Agreement and the World Health Organization, alongside a sweeping review of 90% of USAID-funded projects, signaling a major retreat from climate and global health diplomacy. Federal agencies and universities are in turmoil, leaving thousands of research-professors in limbo amid a politically driven funding freeze. The 2025 March simply calls for the restoration of federal research funding and an end to government censorship and political interference in science.

    Du lundi au vendredi + le dimanche, recevez gratuitement les analyses et décryptages de nos experts pour un autre regard sur l’actualité. Abonnez-vous dès aujourd’hui !

    The US is the world’s undisputed scientific superpower–for now

    While the Trump administration is not the sole force undermining academia worldwide, its actions are particularly striking coming from the world’s leading scientific superpower. Moreover, the situation is especially concerning because developments in the United States often have a ripple effect, shaping policies in other regions in the years that follow.

    Neither of the world’s top two scientific superpowers–Washington and Beijing–is positioned to champion academic freedom. China, having failed a liberal constitutional tradition and academic independence since the 1920s, restricts academic freedom to the confines of one-party rule. Caught between these rival scientific giants–both partners and competitors–the “old” Europe and like-minded coutries remain the only actors capable of setting new standards for academic freedom.

    A Nobel prize for academic freedom

    A decisive step toward its legal protection would be formal recognition by the Nobel Committees for Peace and Science of academic freedom’s fundamental role–both in ensuring scientific excellence and as a pillar of free, democratic societies.

    For the past decade, the Scholars at Risk association (SAR) has documented a broader global decline in academic freedom in its annual Free to Think Report. The 2024 edition highlights particularly alarming situations in 18 countries and territories (including the United States), which recorded 391 attacks on scholars, students, or institutions across 51 regions in a year. Data from the Academic Freedom Index in Berlin confirm that more than half of the world’s population lives in regions where academic freedom is either entirely or severely restricted. Some of the most concerning conditions are in emerging scientific ecosystems such as Turkey, Brazil, Egypt, South Africa, or Saudi Arabia. The overall trend is deteriorating: only 10 out of 179 countries have improved, while many democratic regimes are increasingly affected.

    Academic freedom in the European Union remains relatively high compared to the rest of the world. However, nine EU member states fall below the regional average, and in eight of them, it has declined over the past decade–signaling a gradual erosion of this fundamental value. Hungary ranks the lowest among EU countries, placing in the bottom 20–30% worldwide. Recent laws have further weakened university autonomy across the EU: financial autonomy in Austria, Italy, Luxembourg, the Netherlands, and Slovakia; organizational autonomy in Slovenia, Estonia, and Denmark; staffing autonomy in Croatia and Slovakia; and academic autonomy in Denmark and Estonia. Moreover, the European Parliament’s first report on academic freedom (2023) highlights emerging threats in France–political, educational, and societal–that impact the freedom of research, teaching, and study.

    Academic freedom, a professional right granted to a few for the benefit of all

    Freedom of expression, a fundamental pillar of academic freedom, has long been established as a human right, overcoming centuries of censorship and authoritarian control. In contrast, academic freedom is a more recent principle, granting scholars–recognized by their peers–the right and responsibility to research and teach freely in pursuit of knowledge. Like press freedom for journalists, it is a right granted to a few for the benefit of all.

    Rooted in medieval Europe, academic freedom has evolved from a privilege granted to students in the Quartier Latin to a recognized principle in international rights frameworks. It gained a collective and concrete dimension in the late 18th and early 19th centuries with the rise of the modern university. Wilhelm von Humboldt, founder of the modern public university in Berlin (1810), articulated the concept of ‘freedom of science’ (Wissenschaftsfreiheit), later enshrined in the Weimar Constitution of 1919, which declared that “art, science, and education are free.” The rise of American universities around the same time reshaped the concept, giving rise to “professional academic freedom.” This was formalized in the American Association of University Professors’ 1915 Declaration of Principles on Academic Freedom and Tenure, which affirmed the scholar’s primary duty to seek and establish truth. Though its roots lie in Germany, academic freedom ultimately became a cornerstone of American academic discourse.

    In the United States, academic freedom draws from multiple sources, with its protection varying by state laws, customs, institutional practices, and the status of higher education institutions. However, U.S. Supreme Court rulings have gradually reinforced its constitutional foundation, particularly after the McCarthy era, by invoking the First Amendment. Landmark cases such as Adler v. Board of Education (1952), Wieman v. Updegraff (1952), and Sweezy v. New Hampshire (1957) helped establish a constitutional doctrine on academic freedom. Finally, Keyishian v. Board of Regents (1967) extended First Amendment protections to academia, ruling that mandatory loyalty oaths violated both academic freedom and freedom of association.

    Interestingly, the American interpretation of academic freedom is currently more restrictive than the German model in certain respects. Article 5(3) of the 1989 Basic Law affirms the “right to adopt public organizational measures essential to protect a space of freedom, fostering independent scientific activity”. In contrast, the U.S. places greater emphasis on prohibitions and prioritizing individual rights over institutional autonomy.

    The ‘right to be wrong’

    Despite local variations, academic freedom is fundamentally tied to a shared vision of the university that upholds freedom of thought, with rationality and pluralism at its core. It includes the genuine “right to be wrong”–the understanding that a scientific opinion may be incorrect or even proven so does not diminish its protection. This stands in stark contrast to the anti-science, scientistic, or techno-nationalist approach, which views knowledge as a tool of power to serve a predetermined truth and objective of dominance. Authoritarian science, driven by power interests, seeks to diminish critical humanities and social sciences while elevating religion. It tends to reject interdisciplinary work, is exclusively mathematized, and is oriented toward a centralized yet deregulated autocratic tech-utopian state model.

    Since 1945, we have operated under the illusion that academic freedom is an indispensable condition for scientific excellence. However, we have recently learned that no systematic link exists between academic freedom and breakthrough scientific innovation in our era of new technologies. Given these circumstances, this proposal advocates for a nomination for the Nobel Peace Prize, for the first time in its history, in recognition of academic freedom.

    The Nobel Prize Committees for Science and Peace share the responsibility of using their prestigious platforms to uphold fundamental scientific and democratic values. They are uniquely positioned to champion humanist science, reinforcing its importance for scholars, students, and civil societies worldwide. Since the 1950s, around 90% of Nobel Prize laureates in scientific fields have either been US citizens or have studied and worked at Ivy League research institutions.

    While some US scientists are contesting actions of the Trump administration in court, academics worldwide should stand in solidarity with their American colleagues in resisting the erosion of science. To strengthen their efforts, they require the support of the Nobel Prize Committees.

    Stéphanie Balme ne travaille pas, ne conseille pas, ne possède pas de parts, ne reçoit pas de fonds d’une organisation qui pourrait tirer profit de cet article, et n’a déclaré aucune autre affiliation que son organisme de recherche.

    ref. Academic freedom and democracy under siege: how a Nobel peace prize could help defend them – https://theconversation.com/academic-freedom-and-democracy-under-siege-how-a-nobel-peace-prize-could-help-defend-them-251494

    MIL OSI – Global Reports

  • MIL-OSI USA: 12 men sentenced for conspiring to distribute fentanyl, methamphetamine, marijuana in Tennessee, California

    Source: US Immigration and Customs Enforcement

    NASHVILLE, Tenn. – Twelve members of a drug trafficking conspiracy were sentenced to more than 70 years combined for their roles in conspiring to distribute and possess with intent to distribute controlled substances in middle Tennessee and elsewhere following a joint investigation with U.S. Immigrations and Customs Enforcement Nashville.

    According to court documents, around 2022, agents with ICE Nashville, FBI, and Drug Enforcement Administration began investigating large shipments of counterfeit fentanyl-laced pills that were inscribed “M30,” methamphetamine, and marijuana that someone was shipping to Tennessee and approximately 16 other states from California.

    Agents reviewed shipping materials, monitored social media accounts, and conducted surveillance before identifying Matthew Cox as the individual who was shipping these packages to members of the drug trafficking conspiracy. In their messages on social media applications and phones, the defendants discussed drug prices, drug shipments, and quality of the drugs. One defendant, Quortez Duncan, told Cox that he wanted stronger pills to get customers hooked on the pills to increase profits. Cox complied and attempted to send Duncan these pills, but agents seized them. Agents also learned that another defendant, Khyre McClain, attempted to establish and launder money through a limited liability corporation.

    In addition to this evidence of shipments to other states, agents seized packages of drugs that were being shipped to Tennessee. Specifically, on July 25, 2022, ICE agents seized a package from a UPS Store in Sebastopol, Calif., which was destined for Nashville. This package contained thousands of counterfeit fentanyl-laced pills weighing over two kilograms. The package also contained more than eight pounds of methamphetamine. On Aug. 9, 2022, ICE agents intercepted two additional packages from the Santa Rosa, Calif., area which were destined for residences in Nashville. One package contained 472 grams of counterfeit fentanyl-laced pills, and the other package contained approximately four pounds of methamphetamine.

    After collecting an overwhelming amount of evidence, law enforcement officers executed search warrants at multiple residences in California and Tennessee. They recovered handguns, assault rifles, bulk cash, expensive cars, marijuana, and large amounts of counterfeit fentanyl-laced pills.

    Each defendant was convicted of conspiring to distribute controlled substances. Three defendants were also convicted of unlawfully possessing firearms after previously being convicted of felony offenses.

    The defendants were sentenced as follows:

    • Quortez Duncan, age 37, was sentenced to 15 years in federal prison.
    • Mathew Cox, age 28, was sentenced to 11 years and 8 months in federal prison.
    • Jonny Rodriguez-Gonzalez, age 26, was sentenced to 11 years and 2 months in federal prison.
    • Ricardo Molinero-Alcarez, age 29, was sentenced to 10 years in federal prison.
    • Khyre McClain, age 23, was sentenced to 10 years in federal prison.
    • Davontay Holt, age 30, was sentenced to 10 years in federal prison.
    • Marcus Johnson, age 27, was sentenced to 5 years in federal prison.
    • Tristain Orr, age 25, was sentenced to 5 years in federal prison.
    • Ethan Kimes, age 22, was sentenced to 2 years in federal prison.
    • Marquitues Sawyers, age 24, was sentenced to 1 year and 8 months in federal prison.
    • Jahari Armstrong, age 22, was sentenced to 3 years of probation.
    • Jaydan Armstrong, age 22, was sentenced to 3 years of probation.

    This case was investigated by ICE in Tennessee and California, the Drug Enforcement Administration, the U.S. Postal Inspection Service, the FBI Nashville Field Office, the Tennessee Bureau of Investigation, and the Columbia Police Department.  Assistant U.S. Attorneys Ahmed Safeeullah and Rachel Stephens prosecuted this case.

    MIL OSI USA News

  • MIL-OSI USA: Justice Department Charges 12 Chinese Contract Hackers and Law Enforcement Officers in Global Computer Intrusion Campaigns

    Source: US State of California

    Chinese Law Enforcement and Intelligence Services Leveraged China’s Reckless and Indiscriminate Hacker-for-Hire Ecosystem, Including the ‘APT 27’ Group, to Suppress Free Speech and Dissent Globally and to Steal Data from Numerous Organizations Worldwide,

    Note: View the indictments in U.S. v. Wu Haibo et al., U.S. v. Yin Kecheng, U.S. v. Zhou Shuai et al. here.

    The Justice Department, FBI, Naval Criminal Investigative Service, and Departments of State and the Treasury announced today their coordinated efforts to disrupt and deter the malicious cyber activities of 12 Chinese nationals, including two officers of the People’s Republic of China’s (PRC) Ministry of Public Security (MPS), employees of an ostensibly private PRC company, Anxun Information Technology Co. Ltd. (安洵信息技术有限公司) also known as “i-Soon,” and members of Advanced Persistent Threat 27 (APT27).

    These malicious cyber actors, acting as freelancers or as employees of i-Soon, conducted computer intrusions at the direction of the PRC’s MPS and Ministry of State Security (MSS) and on their own initiative. The MPS and MSS paid handsomely for stolen data. Victims include U.S.-based critics and dissidents of the PRC, a large religious organization in the United States, the foreign ministries of multiple governments in Asia, and U.S. federal and state government agencies, including the U.S. Department of the Treasury (Treasury) in late 2024.

    “The Department of Justice will relentlessly pursue those who threaten our cybersecurity by stealing from our government and our people,” said Sue J. Bai, head of the Justice Department’s National Security Division. “Today, we are exposing the Chinese government agents directing and fostering indiscriminate and reckless attacks against computers and networks worldwide, as well as the enabling companies and individual hackers that they have unleashed. We will continue to fight to dismantle this ecosystem of cyber mercenaries and protect our national security.”

    “The FBI is committed to protecting Americans from foreign cyber-attacks,” said Assistant Director Bryan Vorndran of the FBI’s Cyber Division. “Today’s announcements reveal that the Chinese Ministry of Public Security has been paying hackers-for-hire to inflict digital harm on Americans who criticize the Chinese Communist Party (CCP). To those victims who bravely came forward with evidence of intrusions, we thank you for standing tall and defending our democracy. And to those who choose to aid the CCP in its unlawful cyber activities, these charges should demonstrate that we will use all available tools to identify you, indict you, and expose your malicious activity for all the world to see.”

    According to court documents, the MPS and MSS employed an extensive network of private companies and contractors in China to hack and steal information in a manner that obscured the PRC government’s involvement. In some cases, the MPS and MSS paid private hackers in China to exploit specific victims. In many other cases, the hackers targeted victims speculatively. Operating from their safe haven and motivated by profit, this network of private companies and contractors in China cast a wide net to identify vulnerable computers, exploit those computers, and then identify information that it could sell directly or indirectly to the PRC government. The result of this largely indiscriminate approach was more worldwide computer intrusion victims, more systems worldwide left vulnerable to future exploitation by third parties, and more stolen information, often of no interest to the PRC government and, therefore, sold to other third-parties. Additional information regarding the indictments and the PRC’s hacker-for-hire ecosystem is available in Public Service Announcements published by the FBI today.

    U.S. v. Wu Haibo et al., Southern District of New York

    Today, a federal court in Manhattan unsealed an indictment charging eight i-Soon employees and two MPS officers for their involvement, from at least in or around 2016 through in or around 2023, in the numerous and widespread hacking of email accounts, cell phones, servers, and websites. The Department also announced today the court-authorized seizure of the primary internet domain used by i-Soon to advertise its business.

    “State-sponsored hacking is an acute threat to our community and national security,” said Acting U.S. Attorney Matthew Podolsky for the Southern District of New York. “For years, these 10 defendants — two of whom we allege are PRC officials — used sophisticated hacking techniques to target religious organizations, journalists, and government agencies, all to gather sensitive information for the use of the PRC. These charges will help stop these state-sponsored hackers and protect our national security. The career prosecutors of this office and our law enforcement partners will continue to uncover alleged state-sponsored hacking schemes, disrupt them, and bring those responsible to justice.”

    The defendants remain at large and wanted by the FBI. Concurrent with today’s announcement,  the U.S. Department of State’s Rewards for Justice (RFJ) program, administered by the Diplomatic Security Service, announced a reward of up to $10 million for information leading to the identification or location of any person who, while acting at the direction or under the control of a foreign government, engages in certain malicious cyber activities against U.S. critical infrastructure in violation of the Computer Fraud and Abuse Act. The reward is offered for the following individuals who are alleged to have worked in various capacities to direct or carry out i-Soon’s malicious cyber activity:

    • Wu Haibo (吴海波), Chief Executive Officer
    • Chen Cheng (陈诚), Chief Operating Officer
    • Wang Zhe (王哲), Sales Director
    • Liang Guodong (梁国栋), Technical Staff
    • Ma Li (马丽), Technical Staff
    • Wang Yan (王堰), Technical Staff
    • Xu Liang (徐梁), Technical Staff
    • Zhou Weiwei (周伟伟), Technical Staff
    • Wang Liyu (王立宇), MPS Officer
    • Sheng Jing (盛晶), MPS Officer

    i-Soon and its employees, to include the defendants, generated tens of millions of dollars in revenue as a key player in the PRC’s hacker-for-hire ecosystem. In some instances, i-Soon conducted computer intrusions at the request of the MSS or MPS, including cyber-enabled transnational repression at the direction of the MPS officer defendants. In other instances, i-Soon conducted computer intrusions on its own initiative and then sold, or attempted to sell, the stolen data to at least 43 different bureaus of the MSS or MPS in at least 31 separate provinces and municipalities in China. i-Soon charged the MSS and MPS between approximately $10,000 and $75,000 for each email inbox it successfully exploited. i-Soon also trained MPS employees how to hack independently of i-Soon and offered a variety of hacking methods for sale to its customers.

    The defendants’ U.S.-located targets included a large religious organization that previously sent missionaries to China and was openly critical of the PRC government and an organization focused on promoting human rights and religious freedom in China. In addition, the defendants targeted multiple news organizations in the United States, including those that have opposed the CCP or delivered uncensored news to audiences in Asia, including China and the New York State Assembly, one of whose representatives had communicated with members of a religious organization banned in China.

    The defendants’ foreign-located targets included a religious leader and his office, and a Hong Kong newspaper that i-Soon considered as being opposed to the PRC government. The defendants also targeted the foreign ministries of Taiwan, India, South Korea, and Indonesia.

    Assistant U.S. Attorneys Ryan B. Finkel, Steven J. Kochevar, and Kevin Mead for the Southern District of New York and Trial Attorney Gregory J. Nicosia Jr. of the National Security Division’s National Security Cyber Section are prosecuting the case.

    U.S. v. Yin Kecheng and U.S. v. Zhou Shuai et al., District of Columbia

    Today, a federal court unsealed two indictments charging APT27 actors Yin Kecheng (尹可成) and Zhou Shuai (周帅) also known as “Coldface” for their involvement in the multi-year, for-profit computer intrusion campaigns dating back, in the case of Yin, to 2013. The Department also announced today court-authorized seizures of internet domains and computer server accounts used by Yin and Zhou to facilitate their hacking activity.

    The defendants remain at large. View the FBI’s Wanted posters for Shuai and Kecheng here.

    Concurrent with today’s announcement, the Department of States State’s Bureau of International Narcotics and Law Enforcement Affairs is announcing two reward offers under the Transnational Organized Crime Rewards Program (TOCRP) of up to $2 million each for information leading to the arrests and convictions, in any country, of malicious cyber actors Yin Kecheng and Zhou Shuai, both Chinese nationals residing in China.

    “These indictments and actions show this office’s long-standing commitment to vigorously investigate and hold accountable Chinese hackers and data brokers who endanger U.S. national security and other victims across the globe,” said Interim U.S. Attorney Edward R. Martin Jr. for the District of Columbia. “The defendants in these cases have been hacking for the Chinese government for years, and these indictments lay out the strong evidence showing their criminal wrongdoing. We again demand that the Chinese government to put a stop to these brazen cyber criminals who are targeting victims across the globe and then monetizing the data they have stolen by selling it across China.”

    The APT27 group to which Yin and Zhou belong is also known to private sector security researchers as “Threat Group 3390,” “Bronze Union,” “Emissary Panda,” “Lucky Mouse,” “Iron Tiger,” “UTA0178,” “UNC 5221,” and “Silk Typhoon.” As alleged in court documents, between August 2013 and December 2024, Yin, Zhou, and their co-conspirators exploited vulnerabilities in victim networks, conducted reconnaissance once inside those networks, and installed malware, such as PlugX malware, that provided persistent access. The defendants and their co-conspirators then identified and stole data from the compromised networks by exfiltrating it to servers under their control. Next, they brokered stolen data for sale and provided it to various customers, only some of whom had connections to the PRC government and military. For example, Zhou sold data stolen by Yin through i-Soon, whose primary customers, as noted above, were PRC government agencies, including the MSS and the MPS.

    The defendants’ motivations were financial and, because they were profit-driven, they targeted broadly, rendering victim systems vulnerable well beyond their pilfering of data and other information that they could sell. Between them, Yin and Zhou sought to profit from the hacking of numerous U.S.-based technology companies, think tanks, law firms, defense contractors, local governments, health care systems, and universities, leaving behind them a wake of millions of dollars in damages.

    The documents related to the seizure warrants, also unsealed today, further allege that Yin and Zhou continued to engage in hacking activity, including Yin’s involvement in the recently announced hack of Treasury between approximately September and December 2024. Virtual private servers used to conduct the Treasury intrusion belonged to, and were controlled by, an account that Yin and his co-conspirators established. Yin and his co-conspirators used that same account and other linked accounts they controlled to lease servers used for additional malicious cyber activity. The seizure warrant unsealed today allowed the FBI to seize the virtual private servers and other infrastructure used by the defendants to perpetrate these crimes.

    On Jan. 17, Treasury’s Office of Foreign Assets Control (OFAC) announced sanctions against Yin for his role in hacking that agency between September and December 2024. Concurrent with today’s indictments, OFAC also announced sanctions on Zhou and Shanghai Heiying Information Technology Company Ltd., a company operated by Zhou for purposes of his hacking activity.

    Private sector partners are also taking voluntary actions to raise awareness and strengthen defenses against the PRC’s malicious cyber activity. Today, Microsoft published research that highlights its unique, updated insights into Silk Typhoon tactics, techniques, and procedures specifically its targeting of the IT supply chain.

    Assistant U.S. Attorneys Jack F. Korba and Tejpal S. Chawla for the District of Columbia and Trial Attorney Tanner Kroeger of the National Security Division’s National Security Cyber Section are prosecuting the case.

    ***

    The above disruptive actions targeting PRC malicious cyber activities were the result of investigations conducted by FBI New York and Washington Field Offices, FBI Cyber Division, the Naval Criminal Investigative Service. The U.S. Attorney’s Offices for the Southern District of New York and District of Columbia and the National Security Division’s National Security Cyber Section are prosecuting the case.

    The Department acknowledges the value of public-private partnerships in combating advanced cyber threats and recognizes Microsoft, Volexity, PwC, and Mandiant for their valuable assistance in these investigations.

    The details in the above-described indictments and warrants are merely allegations. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL OSI USA News

  • MIL-OSI Security: Chinese Nationals with Ties to the PRC Government and “APT27” Charged in a Computer Hacking Campaign for Profit, Targeting Numerous U.S. Companies, Institutions, and Municipalities

    Source: Office of United States Attorneys

    Department Seizes Virtual Private Server Account and Domains Tied to Malicious Activity to include the U.S. Department of Treasury Hack

                WASHINGTON – A federal judge in Washington, D.C., today, unsealed two separate indictments that allege Chinese nationals Yin Kecheng, 38, (尹 可成) a/k/a “YKC” (“YIN”) and Zhou Shuai, 45, (周帅) a/k/a “Coldface” (“ZHOU”) violated various federal statutes by participating in years-long, sophisticated computer hacking conspiracies that successfully targeted a wide variety of U.S.-based victims from 2011 to the present-day. According to the documents unsealed today, the defendants targeted a multitude of U.S. victim companies, municipalities, and organizations for profit, causing millions of dollars’ worth of damages. YIN and ZHOU, who have ties to the government of the People’s Republic of China (“PRC”), are alleged to have stolen and exfiltrated data from numerous U.S.-based technology companies, think tanks, defense contractors, government municipalities, and universities that they later brokered for sale. Arrest warrants have been issued for YIN and ZHOU, who both remain fugitives.

                The unsealing by the U.S. Attorney’s Office for the District of Columbia is part of the coordinated effort by Department of Justice (the “Department”), other U.S. Attorney’s Offices, the U.S. Department of Treasury (“Treasury”), and private sector partners that highlights the Chinese government’s unique role in intentionally promoting and protecting the wide-scale computer hacking activity by its citizens. According to court documents unsealed today, the PRC Ministry of Public Security (“MPS”) and Ministry of State Security (“MSS”) directed or financed Chinese hackers, such as the defendants, to conduct computer intrusions against high-value targets in the United States and elsewhere. Victims include U.S.-based critics and dissidents of the PRC, a large religious organization in the United States, the foreign ministries of multiple governments in Asia, and U.S. federal and state government agencies, including most recently in 2024.

                According to court documents, the MPS and MSS employed an extensive network of private companies and contractors in China to hack and steal information in a manner that obscured the PRC government’s direct involvement. By employing these hackers-for-hire, the PRC government further allowed these same hackers to profit by committing additional computer intrusions around the world with impunity, and then to sell stolen data through Chinese data brokers. The PRC government’s state-sponsorship and protection of these hackers resulted in the loss of sensitive, valuable and personal identification information that was a direct harm to U.S. entities and other foreign governments and victims.

                In conjunction with the unsealing, the Department announced the judicially authorized seizure of internet domains linked to YIN that he used in facilitating the conspiracy’s network intrusion activity. In addition, the Department announced the judicially authorized seizure of a Virtual Private Server (“VPS”) account linked to ZHOU that he used to facilitate network intrusion activity. In conjunction with these actions, the Treasury announced sanctions against ZHOU and his company Shanghai Heiying Information Technology company, Limited (“Shanghai Heiying”).  YIN was previously sanctioned for his role in the recent Treasury network compromise in January 2025.

    “These indictments and actions show this Office’s long-standing commitment to vigorously investigate and hold accountable Chinese hackers and data brokers who endanger U.S. national security and other victims across the globe,” said U.S. Attorney Edward R. Martin, Jr. “The defendants in these cases have been hacking for the Chinese government for years, and these indictments lay out the strong evidence showing their criminal wrongdoing. We, again, demand that the Chinese government put a stop to these brazen cyber criminals who are targeting victims across the globe and then monetizing the data they have stolen by selling it across China.”

                “The defendants allegedly waged a yearslong hacking campaign against U.S.-based organizations to steal their data and sell it to various customers, some of whom had connections to the Chinese government,” said FBI Acting Assistant Director in Charge Roman Rozhavsky of the FBI Washington Field Office. “Today’s indictment is the first step toward bringing these perpetrators to justice for endangering U.S. national security and causing significant financial losses for both U.S. and foreign companies. The FBI and our partners will continue to pursue these hostile cyber actors to the full extent of the law.”

                “The defendants’ years-long hacking conspiracy to steal data from Cleared Defense Contractors that support the U.S. military—among many other U.S.-based victims—and sell it to customers with ties to the Chinese government poses a significant threat to our national security,” said NCIS Cyber Operations Field Office Special Agent in Charge Josh Stanley. “NCIS remains committed to working with the FBI and our law enforcement partners around the world to expose malicious actors who seek to undermine the cybersecurity of the Department of the Navy.”

                “The Department of State appreciates the opportunity to collaborate with the Department of Treasury, FBI, and the U.S. Attorney’s Office for the District of Columbia in announcing today’s actions,” said Senior Bureau Official F. Cartwright Weiland of the Department of State’s Bureau of International Narcotics and Law Enforcement Affairs (INL). “With reward offers up to $2 million each for malicious cyber actors Zhou Shuai and Yin KeCheng under the Transnational Organized Crime Rewards Program, we ask the public to contact the FBI with tips to help bring these cybercriminals to justice.”

    Overview

                Today’s announcement reflects nearly a decade-long effort by the Department and the FBI.   The action targets actors that various security researchers have historically referred to as “APT27,” “Threat Group 3390,” “Bronze Union,” “Emissary Panda,” “Lucky Mouse,” and “Iron Tiger,” and more recently referred to as “UTA0178,” “UNC 5221,” and “Silk Typhoon.” 

                The Department obtained a 19-count indictment against YIN on May 2, 2018 (the “2018 Indictment”) from a grand jury sitting in the United States District Court for the District of Columbia. The 2018 Indictment, which alleges conduct between August 2013 and December 2015, charges wire fraud, aggravated identity theft, and violations of the Computer Fraud and Abuse Act (“CFAA”).

                Another federal grand jury in the District of Columbia indicted both YIN and ZHOU on March 28, 2023 (the “2023 Indictment”), with similar offenses.  Specifically, the 2023 Indictment, which alleges conduct between June 2018 and November 2020, charges conspiracy, wire fraud, various violations of the CFAA, aggravated identity theft, and money laundering. 

                On March 4, 2025, a federal magistrate judge sitting in the District of Columbia authorized FBI to seize a VPS account and multiple internet domains involved in the criminal activity.  According to the unsealed affidavits in support of those warrants, ZHOU utilized the VPS account to create additional accounts used to facilitate computer intrusion activity and to discuss the sale of access to compromised computer networks. Separately, YIN utilized his own servers and stood up the seized domains to exploit victim computer networks to include networks at Treasury.

    Computer Hacking Scheme

                As alleged in the documents unsealed today, at various points between August 2013 and December 2024, YIN, ZHOU, and their unindicted co-conspirators used sophisticated hacking tools and techniques in their efforts to overcome network defenses and avoid detection of numerous hardened targets in the United States and around the world. The defendants and their co-conspirators would routinely scan victim networks for vulnerabilities, exploit those vulnerabilities with sophisticated hacking techniques, and conduct reconnaissance once inside a victim’s network. The defendants and their co-conspirators and would install malware that would allow them to maintain persistent access and enable them to communicate with malicious external servers and other hacking infrastructure. The defendants and their co-conspirators would identify and steal data from the compromised networks by exfiltrating the data to servers under their control. The stolen data was then brokered for sale and provided to various customers, some of whom had connections to the PRC government and military.

    Targeting of U.S. Victims

                According to the 2018 Indictment, YIN targeted U.S.-based defense contractors, technology firms, and think tanks, among other victims. The 2018 Indictment alleges YIN openly discussed his preference for targeting American victims. For example, on one occasion in September 2013, YIN told an associate he wanted to “mess with the American military” and “break into a big target” so that he could earn enough money to buy a car. YIN used mapping software to identify network vulnerabilities for the purpose of gaining unlawful access to victim computer and installing malware. YIN used stolen network credentials to maintain persistent access to victim networks and utilized intermediary servers or “hop points” and malicious domains to remotely access and exfiltrate victim computer data.

                According to the 2023 Indictment, YIN, ZHOU, and others targeted U.S.-based companies like technology and defense contractors, law firms, communication service providers, local governments, health care systems, and think tanks. The 2023 Indictment charges YIN and ZHOU with scanning victim networks for access points and also exploiting zero-day vulnerabilities. Once inside the networks, YIN other conspirators would then install malware such as web shells to maintain persistent access. YIN and other conspirators would then use hop point servers to exfiltrate stolen data to servers under YIN’s control. ZHOU then brokered access to such stolen data to interested third parties for a financial profit. The indictment further alleged that YIN, ZHOU, and other conspirators laundered cryptocurrency payments for their operational infrastructure from locations outside of the United States through the U.S. financial system.

                The affidavit in support of the seizure warrant for the VPS account alleges that ZHOU used servers created by the account in order to establish a virtual private network (“VPN”) that would encrypt network traffic such that the true location and IP address of the actor or actors would be obfuscated. ZHOU also used the VPS accounts to create other accounts through which he communicated with buyers who were interested in obtaining access to computer networks compromised by YIN. ZHOU also used the accounts for victim reconnaissance purposes.

                The affidavit in support of the seizure of the domains alleges that funds used to purchase computer network infrastructure used in numerous victim network breaches ultimately connected to an account registered in YIN’s name, from China, using an email address and phone number belonging to YIN. Of particular note, a virtual private server account controlled by YIN was associated with the compromise at Treasury.

                This case is being investigated by the FBI’s Washington Field Office and the Naval Criminal Investigative Service (NCIS) who continue to investigate malicious cyber activity associated with these defendants and threat actors and continue to notify affected victims immediately once any networks intrusions are discovered. The FBI’s Cyber Division and Department of Defense’s Cyber Crimes Center provided valuable assistance to the investigation.  Private partners from Microsoft, Volexity, Palo Alto Networks Unit 42, and Mandiant also provided valuable assistance with this investigation. The case is being prosecuted by Assistant U.S. Attorneys Jack F. Korba, and Tejpal S. Chawla, and National Security Division’s National Security Cyber Section Trial Attorney Tanner Kroeger. Paralegal Specialist Michael Watts and former Assistant U.S. Attorneys Demian Ahn and Opher Shweiki for the United States Attorney’s Office in the District of Columbia provided assistance on this case.

                An indictment is merely an allegation and a defendant is presumed innocent unless and until proven guilty beyond a reasonable doubt in a court of law.  

    MIL Security OSI

  • MIL-OSI Security: Texas Man Sentenced to 200 Months in Prison

    Source: Office of United States Attorneys

    FORT WAYNE – Elijah Shores, 30 years old, of Irving, Texas, was sentenced by United States District Court Chief Judge Holly A. Brady, after pleading guilty to distributing fentanyl, possessing fentanyl with intent to distribute, and possessing a firearm in furtherance of a drug trafficking crime, announced Acting United States Attorney Tina L. Nommay.

    Shores was sentenced to 200 months in prison followed by 4 years of supervised release.

    This case was investigated by the Federal Bureau of Investigation with assistance from the Indiana State Police and the Fort Wayne Police Department. The case was prosecuted by Assistant United States Attorney Lesley J. Miller Lowery.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence, and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.

    MIL Security OSI

  • MIL-OSI Security: Former Clovis CPA Pleads Guilty to Stealing Over $800,000 From a Bank

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    FRESNO, Calif. — Kenneth Gould, 68, formerly of Clovis, pleaded guilty to bank larceny for stealing more than $800,000 from a bank, Acting U.S. Attorney Michele Beckwith announced today.

    According to court records, Gould was a Certified Public Accountant (CPA) and operated a payroll services company in Clovis. From October 2017 through March 2018, he initiated several fraudulent electronic payments from one of his clients’ accounts to his payroll company’s account at the bank. Gould then withdrew the money in cashier’s checks while the payments were pending. After the bank had credited the fraudulent payments to the payroll company’s account for a short period of time, it realized there were insufficient funds to cover the payments, denied the payments, and attempted to recover its money, but it was too late. Approximately $830,000 of the credited funds was already gone. Gould gave the funds to the client from whose account he initiated the fraudulent payments because he had loaned that individual money and was hopeful that the individual would pay him back. Instead, the client gambled the money away.

    This case is the product of an investigation by the Federal Bureau of Investigation. Assistant U.S. Attorney Joseph Barton is prosecuting the case.

    Gould is scheduled to be sentenced by U.S. District Judge Jennifer L. Thurston on June 2, 2025. Gould faces maximum statutory penalties of 10 years in prison and a $250,000 fine. The actual sentence, however, will be determined at the discretion of the court after consideration of any applicable statutory factors and the Federal Sentencing Guidelines, which take into account a number of variables.

    MIL Security OSI

  • MIL-OSI Security: Stockton Man Pleads Guilty for His Role in Large-Scale Methamphetamine Distribution Conspiracy

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    SACRAMENTO, Calif. — Jose Manuel Ontiveros Verdugo, 39, of Stockton, pleaded guilty today to conspiring to possess and distribute methamphetamine, Acting U.S. Attorney Michele Beckwith announced.

    According to court documents, between July 2019 and December 2019, Verdugo conspired with his co-defendants and others to distribute methamphetamine both in Stockton and throughout the country. During the investigation, an undercover source bought a total of 11 pounds of methamphetamine and a half pound of heroin from this drug trafficking organization. Law enforcement interdicted the group’s shipments of 50 pounds of methamphetamine destined for Nebraska, as well as a 21‑pound shipment destined for Pennsylvania.

    This case is the product of an investigation by the Federal Bureau of Investigation with assistance from the California Department of Corrections and Rehabilitation, Customs and Border Protection, the Drug Enforcement Administration, Homeland Security Investigations, San Joaquin County Probation, the Stockton Police Department, and the Tracy Police Department. Assistant U.S. Attorney Adrian T. Kinsella is prosecuting the case.

    Charges are pending against co-defendants Jorge Omar Arredondo Garcia, 46, of Lodi; Gregorio Ontiveros Verdugo, 41, of Morada; Alberto Navarro Zapata, 50, of Stockton; and Wilfredo Reyes, 48, of Manteca. The charges against them are only allegations; they are presumed innocent until and unless proven guilty beyond a reasonable doubt.

    Verdugo is scheduled to be sentenced by U.S. District Judge Dale A. Drozd on June 16, 2025. Verdugo faces a maximum statutory penalty of life in prison and a $10 million fine. The actual sentence, however, will be determined at the discretion of the court after consideration of any applicable statutory factors and the Federal Sentencing Guidelines, which take into account a number of variables.

    The case was investigated under the Organized Crime Drug Enforcement Task Forces (OCDETF). OCDETF identifies, disrupts, and dismantles the highest-level criminal organizations that threaten the United States using a prosecutor-led, intelligence-driven, multi-agency approach. For more information, please visit Justice.gov/OCDETF

    MIL Security OSI

  • MIL-OSI Security: Cocaine Trafficker Sentenced to 210 Months for Drug Distribution Conspiracy

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    SAN DIEGO – Rodolfo Benjamin Silva, a prolific cocaine, methamphetamine, and fentanyl trafficker who called himself the “King of Coke,” was sentenced in federal court today to 17.5 years in prison for distributing large quantities of illicit drugs in the U.S. and for facilitating the movement of cartel hitmen into the United States.

    At today’s hearing, prosecutors described Silva as a long-time San Diego-based drug distributor who worked directly with Mexican counterparts to receive narcotic shipments from Mexico. According to his plea agreement, in October 2022, Silva provided a drug courier with 114 pounds of methamphetamine and a kilogram of fentanyl for transport to Indianapolis, but it was interdicted in Oklahoma.

    Silva also admitted in his plea agreement to threatening, directing or using violence as part of his drug trafficking activities. Prosecutors told the court today that Silva assisted in bringing assassins known as “sicarios” from Mexico into the San Diego area for cartel enforcement operations. On one occasion, Silva hired a sicario from Mexico to come to San Diego where that individual attempted to fatally shoot one of Silva’s rivals, prosecutors said.

    This investigation was led by FBI and DEA in San Diego with integral assistance from the U.S. Attorney’s Office in the Southern District of Indiana and FBI’s Indianapolis Field Office.

    This case is being prosecuted by Assistant U.S. Attorney Ashley Goff.

    This prosecution is part of an Organized Crime Drug Enforcement Task Forces (OCDETF) Strike Force Initiative, which provides for the establishment of permanent multi-agency task force teams that work side-by-side in the same location. This co-located model enables agents from different agencies to collaborate on intelligence-driven, multi-jurisdictional operations to disrupt and dismantle the most significant drug traffickers, money launderers, gangs, and transnational criminal organizations.

    DEFENDANT                                               Case Number 23CR02513-WQH                            

    Rodolfo Benjamin Silva, aka “Rudy”            Age: 44                       San Diego, CA

    SUMMARY OF CHARGES

    Conspiracy to Distribute Cocaine – Title 21, U.S.C., Sections 841(a)(1) and 846

    Maximum penalty: Mandatory minimum 10 years and up to life in prison, $10 million fine

    INVESTIGATING AGENCIES

    Federal Bureau of Investigation

    Drug Enforcement Administration

    MIL Security OSI

  • MIL-OSI Security: New York Man Who Ran Multimillion-Dollar Cryptocurrency Investment Scheme Found Guilty of Wire Fraud and Money Laundering

    Source: Federal Bureau of Investigation (FBI) State Crime Alerts (b)

    SAN FRANCISCO – A federal jury convicted Douglas Jae Woo Kim, 32, of New York, New York, on 14 counts of wire fraud, international money laundering, and money laundering.  The jury reached its verdict yesterday afternoon, following a three-week trial before Senior U.S. District Judge Charles R. Breyer.  

    According to court documents and evidence presented at trial, between October 2017 and June 2020, after moving to San Francisco, Kim engaged in a scheme to defraud investors, many of whom were friends and acquaintances, of over $7 million in money and cryptocurrency by holding himself out as a legitimate trader of cryptocurrency, a form of virtual currency.  Kim falsely represented that he was seeking short-term liquidity in the form of loans or investments for cryptocurrency trading or other legitimate business purposes and promised to trade or invest the cryptocurrency provided by investors and lenders to make a profit.  He also told victims that the loans carried no or very low risk, promised high rates of return on their loans, and claimed that he had sufficient funds to personally guarantee the loans.  

    “This case may involve the new world of virtual currency, but there’s nothing new about the defendant’s scheme to defraud,” said Acting United States Attorney Patrick D. Robbins.  “Douglas Kim made bogus promise after promise to investors and lenders, only to cheat them and send their money to offshore gambling sites.  Today’s verdict sends a clear message to anyone who engages in fraud in the Northern District of California: you will be prosecuted, and you will face serious consequences.”

    “Mr. Kim deceived those who trusted him, exploiting their confidence to fund his personal gambling activities rather than the legitimate investments he offered his victims. The FBI remains committed to identifying and bringing to justice individuals who manipulate and defraud others for financial gain,” said FBI Acting Special Agent in Charge Dan Costin.

    In October 2017, Kim contacted a victim by text message and said he was looking for investors interested in making what he called a short-term loan for a “fairly modest operation.”  Kim represented that he was investing in a cryptocurrency operation in which he would make a profit from fees charged to a peer-to-peer network and from exchange transactions, and informed the victim that the operation “isn’t very risky to me.”  Within days of receiving cryptocurrency from the victim to finance the investment, Kim transferred almost all of it to bitcoin sports betting sites located outside the United States.  Kim went on to obtain over a million dollars’ worth of funds from this victim over the course of the scheme, the majority of which went to offshore sports betting sites.

    In November 2017, Kim contacted another victim by email and said he was looking for cryptocurrency for a trading strategy.  Kim assured that the victim that “my activities are fairly low risk.”  On Dec. 1, 2017, Kim obtained a cryptocurrency loan from this victim worth approximately $186,000 at the time. Once the cryptocurrency was obtained, Kim immediately sent all of it to offshore sports betting sites. In total, Kim obtained over $500,000 in funds from this victim.

    In an agreement dated Jan. 1, 2018, Kim set out the terms of a similar investment with a third victim.  The agreement called for the victim to provide cryptocurrency valued at approximately $200,000 at the time.  The same day, Kim converted more than half of the funds to bitcoin and, in the following days, transferred substantially all the converted cryptocurrency to his account with an offshore casino.  Kim went on to obtain over $4 million in funds from this victim.

    Kim defrauded numerous other victims, including nine who testified at trial, until at least July 2020, when he was charged by federal complaint.  In 2023, while he was out on pretrial release, Kim allegedly renewed his scheme to defraud.  One count related to this renewed period of fraud remains pending.  

    The jury acquitted Kim of one count of international money laundering.

    Kim is scheduled to appear on June 25, 2025, to set a date for sentencing.  He faces a maximum penalty of 20 years in prison for each count of wire fraud and international money laundering, and 10 years in prison for each count of money laundering.  Any sentence will be imposed by the Court after consideration of the U.S. Sentencing Guidelines and the federal statute governing the imposition of a sentence, 18 U.S.C. § 3553.  

    Assistant U.S. Attorneys Noah Stern and Maya Karwande are prosecuting the case with the assistance of Veronica Hernandez, Maryam Beros, Andy Ding, Lynette Dixon, and Christine Tian. The prosecution is the result of an investigation by the FBI and IRS Criminal Investigation. 
     

    MIL Security OSI

  • MIL-OSI Security: Justice Department Charges 12 Chinese Contract Hackers and Law Enforcement Officers in Global Computer Intrusion Campaigns

    Source: United States Attorneys General

    Chinese Law Enforcement and Intelligence Services Leveraged China’s Reckless and Indiscriminate Hacker-for-Hire Ecosystem, Including the ‘APT 27’ Group, to Suppress Free Speech and Dissent Globally and to Steal Data from Numerous Organizations Worldwide,

    Note: View the indictments in U.S. v. Wu Haibo et al., U.S. v. Yin Kecheng, U.S. v. Zhou Shuai et al. here.

    The Justice Department, FBI, Naval Criminal Investigative Service, and Departments of State and the Treasury announced today their coordinated efforts to disrupt and deter the malicious cyber activities of 12 Chinese nationals, including two officers of the People’s Republic of China’s (PRC) Ministry of Public Security (MPS), employees of an ostensibly private PRC company, Anxun Information Technology Co. Ltd. (安洵信息技术有限公司) also known as “i-Soon,” and members of Advanced Persistent Threat 27 (APT27).

    These malicious cyber actors, acting as freelancers or as employees of i-Soon, conducted computer intrusions at the direction of the PRC’s MPS and Ministry of State Security (MSS) and on their own initiative. The MPS and MSS paid handsomely for stolen data. Victims include U.S.-based critics and dissidents of the PRC, a large religious organization in the United States, the foreign ministries of multiple governments in Asia, and U.S. federal and state government agencies, including the U.S. Department of the Treasury (Treasury) in late 2024.

    “The Department of Justice will relentlessly pursue those who threaten our cybersecurity by stealing from our government and our people,” said Sue J. Bai, head of the Justice Department’s National Security Division. “Today, we are exposing the Chinese government agents directing and fostering indiscriminate and reckless attacks against computers and networks worldwide, as well as the enabling companies and individual hackers that they have unleashed. We will continue to fight to dismantle this ecosystem of cyber mercenaries and protect our national security.”

    “The FBI is committed to protecting Americans from foreign cyber-attacks,” said Assistant Director Bryan Vorndran of the FBI’s Cyber Division. “Today’s announcements reveal that the Chinese Ministry of Public Security has been paying hackers-for-hire to inflict digital harm on Americans who criticize the Chinese Communist Party (CCP). To those victims who bravely came forward with evidence of intrusions, we thank you for standing tall and defending our democracy. And to those who choose to aid the CCP in its unlawful cyber activities, these charges should demonstrate that we will use all available tools to identify you, indict you, and expose your malicious activity for all the world to see.”

    According to court documents, the MPS and MSS employed an extensive network of private companies and contractors in China to hack and steal information in a manner that obscured the PRC government’s involvement. In some cases, the MPS and MSS paid private hackers in China to exploit specific victims. In many other cases, the hackers targeted victims speculatively. Operating from their safe haven and motivated by profit, this network of private companies and contractors in China cast a wide net to identify vulnerable computers, exploit those computers, and then identify information that it could sell directly or indirectly to the PRC government. The result of this largely indiscriminate approach was more worldwide computer intrusion victims, more systems worldwide left vulnerable to future exploitation by third parties, and more stolen information, often of no interest to the PRC government and, therefore, sold to other third-parties. Additional information regarding the indictments and the PRC’s hacker-for-hire ecosystem is available in Public Service Announcements published by the FBI today.

    U.S. v. Wu Haibo et al., Southern District of New York

    Today, a federal court in Manhattan unsealed an indictment charging eight i-Soon employees and two MPS officers for their involvement, from at least in or around 2016 through in or around 2023, in the numerous and widespread hacking of email accounts, cell phones, servers, and websites. The Department also announced today the court-authorized seizure of the primary internet domain used by i-Soon to advertise its business.

    “State-sponsored hacking is an acute threat to our community and national security,” said Acting U.S. Attorney Matthew Podolsky for the Southern District of New York. “For years, these 10 defendants — two of whom we allege are PRC officials — used sophisticated hacking techniques to target religious organizations, journalists, and government agencies, all to gather sensitive information for the use of the PRC. These charges will help stop these state-sponsored hackers and protect our national security. The career prosecutors of this office and our law enforcement partners will continue to uncover alleged state-sponsored hacking schemes, disrupt them, and bring those responsible to justice.”

    The defendants remain at large and wanted by the FBI. Concurrent with today’s announcement,  the U.S. Department of State’s Rewards for Justice (RFJ) program, administered by the Diplomatic Security Service, announced a reward of up to $10 million for information leading to the identification or location of any person who, while acting at the direction or under the control of a foreign government, engages in certain malicious cyber activities against U.S. critical infrastructure in violation of the Computer Fraud and Abuse Act. The reward is offered for the following individuals who are alleged to have worked in various capacities to direct or carry out i-Soon’s malicious cyber activity:

    • Wu Haibo (吴海波), Chief Executive Officer
    • Chen Cheng (陈诚), Chief Operating Officer
    • Wang Zhe (王哲), Sales Director
    • Liang Guodong (梁国栋), Technical Staff
    • Ma Li (马丽), Technical Staff
    • Wang Yan (王堰), Technical Staff
    • Xu Liang (徐梁), Technical Staff
    • Zhou Weiwei (周伟伟), Technical Staff
    • Wang Liyu (王立宇), MPS Officer
    • Sheng Jing (盛晶), MPS Officer

    i-Soon and its employees, to include the defendants, generated tens of millions of dollars in revenue as a key player in the PRC’s hacker-for-hire ecosystem. In some instances, i-Soon conducted computer intrusions at the request of the MSS or MPS, including cyber-enabled transnational repression at the direction of the MPS officer defendants. In other instances, i-Soon conducted computer intrusions on its own initiative and then sold, or attempted to sell, the stolen data to at least 43 different bureaus of the MSS or MPS in at least 31 separate provinces and municipalities in China. i-Soon charged the MSS and MPS between approximately $10,000 and $75,000 for each email inbox it successfully exploited. i-Soon also trained MPS employees how to hack independently of i-Soon and offered a variety of hacking methods for sale to its customers.

    The defendants’ U.S.-located targets included a large religious organization that previously sent missionaries to China and was openly critical of the PRC government and an organization focused on promoting human rights and religious freedom in China. In addition, the defendants targeted multiple news organizations in the United States, including those that have opposed the CCP or delivered uncensored news to audiences in Asia, including China and the New York State Assembly, one of whose representatives had communicated with members of a religious organization banned in China.

    The defendants’ foreign-located targets included a religious leader and his office, and a Hong Kong newspaper that i-Soon considered as being opposed to the PRC government. The defendants also targeted the foreign ministries of Taiwan, India, South Korea, and Indonesia.

    Assistant U.S. Attorneys Ryan B. Finkel, Steven J. Kochevar, and Kevin Mead for the Southern District of New York and Trial Attorney Gregory J. Nicosia Jr. of the National Security Division’s National Security Cyber Section are prosecuting the case.

    U.S. v. Yin Kecheng and U.S. v. Zhou Shuai et al., District of Columbia

    Today, a federal court unsealed two indictments charging APT27 actors Yin Kecheng (尹可成) and Zhou Shuai (周帅) also known as “Coldface” for their involvement in the multi-year, for-profit computer intrusion campaigns dating back, in the case of Yin, to 2013. The Department also announced today court-authorized seizures of internet domains and computer server accounts used by Yin and Zhou to facilitate their hacking activity.

    The defendants remain at large. View the FBI’s Wanted posters for Shuai and Kecheng here.

    Concurrent with today’s announcement, the Department of States State’s Bureau of International Narcotics and Law Enforcement Affairs is announcing two reward offers under the Transnational Organized Crime Rewards Program (TOCRP) of up to $2 million each for information leading to the arrests and convictions, in any country, of malicious cyber actors Yin Kecheng and Zhou Shuai, both Chinese nationals residing in China.

    “These indictments and actions show this office’s long-standing commitment to vigorously investigate and hold accountable Chinese hackers and data brokers who endanger U.S. national security and other victims across the globe,” said Interim U.S. Attorney Edward R. Martin Jr. for the District of Columbia. “The defendants in these cases have been hacking for the Chinese government for years, and these indictments lay out the strong evidence showing their criminal wrongdoing. We again demand that the Chinese government to put a stop to these brazen cyber criminals who are targeting victims across the globe and then monetizing the data they have stolen by selling it across China.”

    The APT27 group to which Yin and Zhou belong is also known to private sector security researchers as “Threat Group 3390,” “Bronze Union,” “Emissary Panda,” “Lucky Mouse,” “Iron Tiger,” “UTA0178,” “UNC 5221,” and “Silk Typhoon.” As alleged in court documents, between August 2013 and December 2024, Yin, Zhou, and their co-conspirators exploited vulnerabilities in victim networks, conducted reconnaissance once inside those networks, and installed malware, such as PlugX malware, that provided persistent access. The defendants and their co-conspirators then identified and stole data from the compromised networks by exfiltrating it to servers under their control. Next, they brokered stolen data for sale and provided it to various customers, only some of whom had connections to the PRC government and military. For example, Zhou sold data stolen by Yin through i-Soon, whose primary customers, as noted above, were PRC government agencies, including the MSS and the MPS.

    The defendants’ motivations were financial and, because they were profit-driven, they targeted broadly, rendering victim systems vulnerable well beyond their pilfering of data and other information that they could sell. Between them, Yin and Zhou sought to profit from the hacking of numerous U.S.-based technology companies, think tanks, law firms, defense contractors, local governments, health care systems, and universities, leaving behind them a wake of millions of dollars in damages.

    The documents related to the seizure warrants, also unsealed today, further allege that Yin and Zhou continued to engage in hacking activity, including Yin’s involvement in the recently announced hack of Treasury between approximately September and December 2024. Virtual private servers used to conduct the Treasury intrusion belonged to, and were controlled by, an account that Yin and his co-conspirators established. Yin and his co-conspirators used that same account and other linked accounts they controlled to lease servers used for additional malicious cyber activity. The seizure warrant unsealed today allowed the FBI to seize the virtual private servers and other infrastructure used by the defendants to perpetrate these crimes.

    On Jan. 17, Treasury’s Office of Foreign Assets Control (OFAC) announced sanctions against Yin for his role in hacking that agency between September and December 2024. Concurrent with today’s indictments, OFAC also announced sanctions on Zhou and Shanghai Heiying Information Technology Company Ltd., a company operated by Zhou for purposes of his hacking activity.

    Private sector partners are also taking voluntary actions to raise awareness and strengthen defenses against the PRC’s malicious cyber activity. Today, Microsoft published research that highlights its unique, updated insights into Silk Typhoon tactics, techniques, and procedures specifically its targeting of the IT supply chain.

    Assistant U.S. Attorneys Jack F. Korba and Tejpal S. Chawla for the District of Columbia and Trial Attorney Tanner Kroeger of the National Security Division’s National Security Cyber Section are prosecuting the case.

    ***

    The above disruptive actions targeting PRC malicious cyber activities were the result of investigations conducted by FBI New York and Washington Field Offices, FBI Cyber Division, the Naval Criminal Investigative Service. The U.S. Attorney’s Offices for the Southern District of New York and District of Columbia and the National Security Division’s National Security Cyber Section are prosecuting the case.

    The Department acknowledges the value of public-private partnerships in combating advanced cyber threats and recognizes Microsoft, Volexity, PwC, and Mandiant for their valuable assistance in these investigations.

    The details in the above-described indictments and warrants are merely allegations. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

    MIL Security OSI

  • MIL-OSI United Kingdom: More rights for victims of crime

    Source: Scottish Government

    Notification scheme to be expanded.

    More crime victims will get access to a range of information about the perpetrator and have a say on decisions about their prison release under newly unveiled justice reforms.

    Currently victims can register with the Victim Notification Scheme (VNS) if the offender in their case has been sentenced to 18 months or more in prison, or with the Victim Information Scheme if the sentence was less than 18 months. Under Scottish Government proposals to be considered by the Scottish Parliament, all victims will be able to register under one programme with the same right rights and same access to information, regardless of the length of the offender’s prison sentence.

    A further proposal, if approved by MSPs, would give all victims the right to make representations where an offender is being considered for release on licence – and on the licence conditions they would like to see imposed. Currently this entitlement only applies where an offender was sentenced to four years or more in custody.

    Improvements are also proposed to the range of information available through the VNS for victims of offenders in the forensic mental health system who are subject to a compulsion order and restriction order.

    The plans build on previously announced proposed reforms to the Victim Notification Scheme that will create a new Victim Contact Team to give personalised support based on a victim’s individual needs.

    The latest plans are being introduced as proposed amendments to the Victims, Witnesses, and Justice Reform (Scotland) Bill, the next stage of which begins in the Scottish Parliament next week.

    Victims Minister Siobhian Brown said:

    “These reforms will put victims’ rights at the heart of the justice system. Victims of crime will be able to sign up to one simplified notification scheme that allows them to receive information about the offenders and, if they wish, to have a say in decisions being made about the offenders, including their release. These changes recognise that a victim’s rights should not hinge on the length of sentence that the perpetrator is serving.

    “One system will be easier for victims to navigate and this change will add to a raft of proposed reforms to the VNS, including the creation of a new Victim Contact Team.  We want victims to know their rights to receive information and to be supported to make informed choices on whether they wish to do so. We will continue to work closely with victims’ representatives as we take forward these reforms.”

     Background

    The Victim Notification Scheme (VNS) entitles victims of offenders sentenced to 18 months of more (or close relatives of those victims) to certain information about the person responsible for the crime, such as the date of the offender’s release or if they are eligible for temporary release, such as for training, work or home leave.

    For those who register, Part 2 of the VNS gives victims, or in certain cases the victim’s representative, the right to contribute to decisions taken whilst the offender is in prison or detained in hospital. This includes the right to make representations about the release of the offender.

    The Victim Information Scheme (VIS) is available for victims of offenders who are sentenced to less than 18 months’ imprisonment. Victims who sign up to the VIS are currently entitled to know only the date of the release or escape of the offender.

    The planned reforms to the VNS form part of the Scottish Government’s response to the Independent Review of the Victim Notification Scheme, which heard directly from victims about their experiences of the justice system and the VNS.

    Victim Notification Scheme: guidance for victims of crime

    A separate notification scheme exists for victims of offenders with a mental disorder.

    Scottish Government response to the Independent Review of the Victim Notification Scheme

    Victim Notification Scheme: Independent Review

    MIL OSI United Kingdom

  • MIL-OSI USA: Former Alabama Police Officer Pleads Guilty to Federal Civil Rights Violation and Child Sexual Exploitation

    Source: US State Government of Utah

    A former Killen, Alabama, Police Department officer pleaded guilty yesterday for sexually assaulting a woman while on duty and for receiving sexually explicit photos of a minor.

    As part of the plea agreement, Jarrod Gailen Webster admitted that, on Nov. 12, 2023, he violated the civil rights of a woman after initiating a traffic stop on the woman’s vehicle. Webster asked the woman to step out of her vehicle and he asked her what she wanted to do to “get out of this.” When the woman told Webster that she was not going to do anything for him, Webster handcuffed the woman and sexually assaulted her.

    Further, Webster admitted that, between June 2016 and October 2018, he communicated with a minor by phone. Webster asked the minor to produce and send him sexually explicit images of herself. The minor victim sent multiple photos to Webster at his request, at least one of which constituted child sexual abuse material (CSAM).

    “Jarrod Webster took an oath to protect and serve citizens of his community. He violated that oath when he sexually assaulted a woman and exploited a minor to produce and send sexually explicit images,” said U.S. Attorney Prim F. Escalona for the Northern District of Alabama. “We will continue to work with our law enforcement partners to ensure that those who violate positions of public trust are held accountable for their actions.”

    “Police officers are given immense trust and responsibility to serve and protect, and are therefore held to a higher standard, so there are serious consequences when one tarnishes the badge by breaking the law,” said Special Agent in Charge Carlton Peeples of the FBI Birmingham Field Office. “Jarrod Gailen Webster disgraced the uniform when he abused his authority, his sentencing affirms that the FBI has zero tolerance for officials who prey on the citizens they have sworn to protect.”

    Webster pleaded guilty to one count of deprivation of rights under color of law and one count of sexual exploitation of children. He is scheduled to be sentenced on May 20.

    Webster faces a maximum penalty of life in prison, five years of supervised release, and a fine of up to $250,000 for the count of deprivation of rights under color of law. He faces a mandatory minimum penalty of 15 years and maximum penalty of 30 years in prison, supervised release for life, and a fine of up to $250,000 for the count of sexual exploitation of children. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    The FBI Birmingham Field Office investigated the case.

    Assistant U.S. Attorney Michael Royster for the Northern District of Alabama and Senior Sex Crimes Counsel Maura White and Trial Attorney Sarah Howard of the Civil Rights Division’s Criminal Section are prosecuting the case. 

    MIL OSI USA News

  • MIL-OSI Security: Former Alabama Police Officer Pleads Guilty to Federal Civil Rights Violation and Child Sexual Exploitation

    Source: Office of United States Attorneys

    A former Killen, Alabama, Police Department officer pleaded guilty yesterday for sexually assaulting a woman while on duty and for receiving sexually explicit photos of a minor.

    As part of the plea agreement, Jarrod Gailen Webster admitted that, on Nov. 12, 2023, he violated the civil rights of a woman after initiating a traffic stop on the woman’s vehicle. Webster asked the woman to step out of her vehicle and he asked her what she wanted to do to “get out of this.” When the woman told Webster that she was not going to do anything for him, Webster handcuffed the woman and sexually assaulted her.

    Further, Webster admitted that, between June 2016 and October 2018, he communicated with a minor by phone. Webster asked the minor to produce and send him sexually explicit images of herself. The minor victim sent multiple photos to Webster at his request, at least one of which constituted child sexual abuse material (CSAM).

    “Jarrod Webster took an oath to protect and serve citizens of his community. He violated that oath when he sexually assaulted a woman and exploited a minor to produce and send sexually explicit images,” said U.S. Attorney Prim F. Escalona for the Northern District of Alabama. “We will continue to work with our law enforcement partners to ensure that those who violate positions of public trust are held accountable for their actions.”

    “Police officers are given immense trust and responsibility to serve and protect, and are therefore held to a higher standard, so there are serious consequences when one tarnishes the badge by breaking the law,” said Special Agent in Charge Carlton Peeples of the FBI Birmingham Field Office. “Jarrod Gailen Webster disgraced the uniform when he abused his authority, his sentencing affirms that the FBI has zero tolerance for officials who prey on the citizens they have sworn to protect.”

    Webster pleaded guilty to one count of deprivation of rights under color of law and one count of sexual exploitation of children. He is scheduled to be sentenced on May 20.

    Webster faces a maximum penalty of life in prison, five years of supervised release, and a fine of up to $250,000 for the count of deprivation of rights under color of law. He faces a mandatory minimum penalty of 15 years and maximum penalty of 30 years in prison, supervised release for life, and a fine of up to $250,000 for the count of sexual exploitation of children. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.

    The FBI Birmingham Field Office investigated the case.

    Assistant U.S. Attorney Michael Royster for the Northern District of Alabama and Senior Sex Crimes Counsel Maura White and Trial Attorney Sarah Howard of the Civil Rights Division’s Criminal Section are prosecuting the case. 

    MIL Security OSI

  • MIL-OSI Security: McKees Rocks Felon Charged with Possession of Firearm

    Source: Office of United States Attorneys

    PITTSBURGH, Pa. – A resident of McKees Rocks, Pennsylvania, has been indicted by a federal grand jury in Pittsburgh on a charge of violating a federal firearms law, Acting United States Attorney Troy Rivetti announced today.

    The one-count Indictment named Mark Edwin Clements III, 23, as the sole defendant.

    According to the Indictment, on February 21, 2025, Clements possessed a firearm as a convicted felon. Federal law prohibits possession of a firearm or ammunition by a convicted felon.

    The law provides for a maximum total sentence of up to 15 years in prison, a fine of up to $250,000, or both. Under the federal Sentencing Guidelines, the actual sentence imposed would be based upon the seriousness of the offense and the prior criminal history of the defendant.

    Assistant United States Attorney Douglas C. Maloney is prosecuting this case on behalf of the United States.

    The Bureau of Alcohol, Tobacco, Firearms and Explosives conducted the investigation leading to the Indictment.

    This case is part of Project Safe Neighborhoods (PSN), a program bringing together all levels of law enforcement and the communities they serve to reduce violent crime and gun violence and to make our neighborhoods safer for everyone. On May 26, 2021, the Department launched a violent crime reduction strategy strengthening PSN based on these core principles: fostering trust and legitimacy in our communities, supporting community-based organizations that help prevent violence from occurring in the first place, setting focused and strategic enforcement priorities, and measuring the results.

    An indictment is an accusation. A defendant is presumed innocent unless and until proven guilty.

    MIL Security OSI

  • MIL-OSI Security: Guatemalan Man Indicted for Illegal Re-entry into U.S.

    Source: Office of United States Attorneys

    PITTSBURGH, Pa. – A citizen of Guatemala has been indicted by a federal grand jury in Pittsburgh on a charge of illegal re-entry of a removed alien, Acting United States Attorney Troy Rivetti announced today.

    The one-count Indictment named Edgar Lopez-Gomez, 29, as the sole defendant.

    According to the Indictment, on February 20, 2025, Lopez-Gomez was found in western Pennsylvania after having been removed from the United States on or about July 18, 2017.

    The law provides for a maximum total sentence of up to two years in prison, a fine of up to $250,000, or both. Under the federal Sentencing Guidelines, the actual sentence imposed would be based upon the seriousness of the offense and the prior criminal history of the defendant.

    Assistant United States Attorney Justin E. Lewis is prosecuting this case on behalf of the United States.

    U.S. Immigration and Customs Enforcement’s Enforcement and Removal Operations conducted the investigation leading to the Indictment.

    An indictment is an accusation. A defendant is presumed innocent unless and until proven guilty.

    MIL Security OSI

  • MIL-OSI: OBSI announces new board members

    Source: GlobeNewswire (MIL-OSI)

    TORONTO, March 05, 2025 (GLOBE NEWSWIRE) — The Board of Directors for the Ombudsman for Banking Services and Investments (OBSI) is pleased to announce three appointments to the board:

    • Maureen L. Buckley CPA, CA has joined the board as a Community Director. Ms. Buckley has held several leadership positions within the Ontario Public Service, most recently as the Provincial Controller where she led the preparation and release of the Ontario Public Accounts. Previously, she was the Chief Administrative Officer at multiple ministries within the Ontario Public Service. Before joining the Ontario Public Service, Ms. Buckley held several roles at Price Waterhouse where she earned her Chartered Accountant designation. She holds an undergraduate degree from York University.
    • Jason Enouy B.A., JD has joined the board as an Industry Director. He is the Senior Vice President and Chief Compliance Officer at Raymond James Ltd., leading all compliance functions for the firm. Before joining the firm, he led compliance and risk management functions at two large Canadian wealth management and securities firms, as well as a schedule II chartered bank. Mr. Enouy is a member of the Law Society of Ontario and holds a Juris Doctor from the University of Toronto and a Bachelor of Arts from Carleton University in Ottawa. He sits on the Board of the Raymond James Canada Foundation.
    • Professor Marina Pavlović LL.B, LL.M has joined the board as a Consumer Interest Director. She is an Associate Professor at the University of Ottawa, Faculty of Law, Common Law Section. A leading Canadian expert on consumer rights and technology policy, she brings extensive experience in research, advocacy, and law reform focused on consumer rights and access to justice. Ms. Pavlović has strong ties with consumer and public interest organizations and has represented them as counsel before the Supreme Court of Canada in landmark cases, including Douez v. Facebook, Uber v. Heller, and International Air Transport Association v. Canada. She has also appeared before the CRTC, the Canadian Transportation Agency, and parliamentary committees, influencing key policy and regulatory decisions affecting consumer rights. An award-winning educator, Ms. Pavlović is recognized for redefining legal education through her innovative and immersive teaching. She holds a law degree from the University of Belgrade, an LL.M. in Law & Technology from the University of Ottawa and is a member of the Law Society of Ontario.

    OBSI is overseen by an independent Board of Directors. OBSI’s bylaws require that a majority of directors, including the Board Chair, be independent, meaning they have not been affiliated with industry for at least two years. These independent directors are referred to as community directors. Three of the community directors are also designated as consumer interest directors, who have a particular interest in, access to, and competency with the interests and perspectives of the consumers that OBSI serves. The board also includes three designated industry directors who are directly affiliated with a participating firm.

    Industry directors and consumer interest directors are expected to bring their unique perspectives and expertise to board deliberations to ensure that OBSI governance is undertaken with an understanding and appreciation of the interests and concerns of all the stakeholders served by the organization. All directors have a fiduciary duty to OBSI and do not advocate for or represent any outside interest while engaged in OBSI governance.

    More information about the Board of Directors is available here.

    Canada’s Ombudsman for Banking Services and Investments (OBSI) is a national, independent, not-for-profit organization that helps resolve and reduce disputes between consumers and financial services firms in both official languages. OBSI is responsive to consumer inquiries, conducts fair and accessible investigations of unresolved disputes, and shares its knowledge and expertise with all stakeholders and the public. If a consumer has a complaint against an OBSI participating bank or investment firm that they are not able to resolve with the bank or firm, OBSI will investigate at no cost to the consumer. Where a complaint has merit, OBSI may recommend compensation up to a maximum of $350,000.

    For more information, contact:

    Mark Wright, Director, Communications and Stakeholder Relations

    416-287-2877 ext.2225

    publicaffairs@obsi.ca

    The MIL Network