January 24, 2022

News

News Network

International Law Enforcement Operation Targeting Opioid Traffickers on the Darknet Results in over 170 Arrests Worldwide and the Seizure of Weapons, Drugs and over $6.5 Million

18 min read
<div>Today, the Department of Justice, through the Joint Criminal Opioid and Darknet Enforcement (JCODE) team joined Europol to announce the results of Operation DisrupTor, a coordinated international effort to disrupt opioid trafficking on the Darknet. The operation, which was conducted across the United States and Europe, demonstrates the continued partnership between JCODE and Europol against the illegal sale of drugs and other illicit goods and services. Operation DisrupTor builds on the success of last year’s Operation SaboTor and the coordinated law enforcement takedown of the Wall Street Market, one of the largest illegal online markets on the dark web.</div>

Today, the Department of Justice, through the Joint Criminal Opioid and Darknet Enforcement (JCODE) team joined Europol to announce the results of Operation DisrupTor, a coordinated international effort to disrupt opioid trafficking on the Darknet. The operation, which was conducted across the United States and Europe, demonstrates the continued partnership between JCODE and Europol against the illegal sale of drugs and other illicit goods and services.  Operation DisrupTor builds on the success of last year’s Operation SaboTor and the coordinated law enforcement takedown of the Wall Street Market, one of the largest illegal online markets on the dark web. 

Following the Wall Street Market takedown in May 2019, U.S. and international law enforcement agencies obtained intelligence to identify Darknet drug traffickers, resulting in a series of complementary, but separate, law enforcement investigations. Operation DisrupTor actions have resulted in the arrest of 179 Darknet drug traffickers and fraudulent criminals who engaged in tens of thousands of sales of illicit goods and services across the United States and Europe.

This operation resulted in the seizure of over $6.5 million in both cash and virtual currencies; approximately 500 kilograms of drugs worldwide; 274 kilograms of drugs, including fentanyl, oxycodone, hydrocodone, methamphetamine, heroin, cocaine, ecstasy, MDMA, and medicine containing addictive substances in the United States; and 63 firearms. Darknet vendor accounts were identified and attributed to real individuals selling illicit goods on Darknet market sites such as AlphaBay, Dream, WallStreet, Nightmare, Empire, White House, DeepSea, Dark Market and others. By leveraging complementary partnerships and surging resources across the U.S. government and Europol, Operation DisrupTor was used to significantly disrupt the online opioid trade and send a strong message that criminals operating on the Darknet are not beyond the reach of law enforcement. 

Operation DisrupTor led to 121 arrests in the United States including two in Canada at the request of the United States, 42 in Germany, eight in the Netherlands, four in the United Kingdom, three in Austria, and one in Sweden. A number of investigations are still ongoing to identify the individuals behind dark web accounts.

“Criminals selling fentanyl on the Darknet should pay attention to Operation DisrupTor,” said Deputy Attorney General Jeffrey Rosen.  “The arrest of 179 of them in seven countries—with the seizure of their drug supplies and their money as well—shows that there will be no safe haven for drug dealing in cyberspace.”

“With the spike in opioid-related overdose deaths during the COVID-19 pandemic, we recognize that today’s announcement is important and timely,” said FBI Director Christopher Wray.  “The FBI wants to assure the American public, and the world, that we are committed to identifying Darknet drug dealers and bringing them to justice.  But our work does not end with today’s announcement. The FBI, through JCODE and our partnership with Europol, continues to be actively engaged in a combined effort to disrupt the borderless, worldwide trade of illicit drugs. The FBI will continue to use all investigative techniques and tools to identify and prosecute Darknet opioid dealers, wherever they may be located.”

“The 21st century has ushered in a tidal wave of technological advances that have changed the way we live,” said DEA Acting Administrator Timothy J. Shea.  “But as technology has evolved, so too have the tactics of drug traffickers.  Riding the wave of technological advances, criminals attempt to further hide their activities within the dark web through virtual private networks and tails, presenting new challenges to law enforcement in the enduring battle against illegal drugs.  Operation DisrupTor demonstrates the ability of DEA and our partners to outpace these digital criminals in this ever-changing domain, by implementing innovative ways to identify traffickers attempting to operate anonymously and disrupt these criminal enterprises.”

“U.S. Immigration and Custom’s Enforcement’s (ICE) Homeland Security Investigations (HSI) has played an integral role in Operation DisrupTor which has effectively removed opioids from our communities,” said ICE Acting Deputy Director Derek Benner.  “It has been an honor to work alongside our domestic and international law enforcement partners and pursue bad actors hiding on the Darknet.  Our trained cyber analysts and investigators have conducted undercover efforts that target dark website operators, vendors and prolific buyers of these dangerous drugs. HSI special agents employ unique investigative capabilities to trace and identify the proceeds stemming from the distribution and online sales of fentanyl and other illicit opioids. These efforts will continue to thwart a significant amount of criminal drug sale activity and deter criminals believing they can operate with anonymity on the Darknet.”

“The U.S. Postal Inspection Service has worked diligently for years to rid the mail of illicit drug trafficking and preserve the integrity of the mail,” said Chief Postal Inspector Gary Barksdale.  “Most importantly, these efforts provide a safe environment for postal employees and the American public.  Today’s announcement serves as an outstanding example of the worldwide impact Postal Inspectors can make through our ever-growing partnerships with federal and international law enforcement agencies.  On behalf of the U.S. Postal Service, we offer our sincere appreciation to all of our partners in this operation who helped protect the nation’s mail, and we pledge to never relent in our pursuit of criminals seeking to exploit the U.S. mail.”

“Law enforcement is most effective when working together, and today’s announcement sends a strong message to criminals selling or buying illicit goods on the dark web: the hidden internet is no longer hidden, and your anonymous activity is not anonymous,” said Edvardas Šileris, the Head of Europol’s European Cybercrime Centre (EC3). “Law enforcement is committed to tracking down criminals, no matter where they operate – be it on the streets or behind a computer screen.”

The extensive operation, which lasted nine months, resulted in over dozens of federal prosecutions including:

  • The Los Angeles JCODE Task Force, in conjunction with the U.S. Attorney’s Office for the Central District of California, successfully dismantled a drug trafficking organization that used online monikers such as “Stealthgod” to sell methamphetamine and MDMA on multiple Darknet marketplaces. Investigators have linked the crew to more than 18,000 illicit drug sales to customers in at least 35 states and numerous countries around the world. During law enforcement actions in Southern California earlier this year, members of JCODE arrested five defendants and seized approximately 120 pounds of methamphetamine, seven kilograms of MDMA and five firearms. Two of the five – Teresa McGrath, 34, of Sunland-Tujunga, and Mark Chavez, 41, of downtown Los Angeles – have since pleaded guilty to narcotics-trafficking and other offenses, and each faces a 15-year mandatory minimum sentence. As the investigation continued, the Los Angeles JCODE Task Force made additional seizures, including $1.6 million in cryptocurrency, 11 pounds of methamphetamine and 14 pounds of pills pressed with methamphetamine. Andres Bermudez, 37, of Palmdale, California, who allegedly was a main supplier of methamphetamine to the “Stealthgod” crew, was charged last week with a narcotics-trafficking offense that carry a 10-year mandatory minimum sentence. He is considered a fugitive.
     
  • Arden McCann, 32, of Quebec, Canada, was charged with conspiring to import drugs into the United States and money laundering conspiracy, in a four-count indictment returned by a grand jury in Atlanta, Georgia. According to court documents, the defendant is alleged to have imported alprazolam, fentanyl, U-47700, and fentanyl analogues such as carfentanil, furanyl fentanyl, 4-fluoroisobutyryl fentanyl, acryl fentanyl, and methoxyacetyl fentanyl into the United States from Canada and China. The superseding indictment alleges that fentanyl analogues the defendant imported into the United States resulted in a non-fatal overdose in April 2016, and fentanyl the defendant imported into the United States resulted in an overdose death in December 2016.
     
  • Khlari Sirotkin, 36, of Colorado; Kelly Stephens, 32, of Colorado; Sean Deaver, 36, of Nevada; Abby Jones, 37, of Nevada; and Sasha Sirotkin, 32, of California, were charged with drug trafficking and money laundering conspiracy, in a 21-count indictment returned by a grand jury in Cincinnati, Ohio. According to court documents, the defendants are alleged to be members of one of the most prolific online drug trafficking organizations in the United States and allegedly specialized in the manufacturing and distribution of more than one million fentanyl-laced counterfeit pills and laundered approximately $2.8 million over the course of the conspiracy. The pressed fentanyl pills, along with heroin, methamphetamine and cocaine, were shipped to the Southern District of Ohio and throughout the country. FBI, DEA, FDA, HSI and USPIS agents seized 2.5 kilograms of fentanyl; 5,095 pressed xanax; 50 suboxone; 16.5 grams of cocaine; 37 grams of crystal meth; 12 grams of black tar heroin; an industrial pill press; 5,908 pounds of dried marijuana with an estimated street value of $9 million; $80,191 in cash, 10 firearms and one pound of fentanyl.
     
  • The FBI Washington Field Office’s Hi-Tech Opioid Task Force, in conjunction with the U.S. Attorney’s Office for the Eastern District of Virginia, successfully thwarted a firebomb attack plot involving explosives, firearms, the Darknet, prescription opioid trafficking, cryptocurrency, and sophisticated money laundering. William Anderson Burgamy, 33, of Hanover, Maryland, and Hyrum T. Wilson, 41, of Auburn, Nebraska, pleaded guilty in the Eastern District of Virginia to charges related to a conspiracy to use explosives to firebomb and destroy a competitor pharmacy in Nebraska. Burgamy, who is not a pharmacist, operated as the Darknet vendor NeverPressedRX (NPRX) since at least August 2019. Wilson, who was a licensed pharmacist, illegally mailed to Burgamy over 19,000 dosage units of prescription medications, including opioids, from his pharmacy in Nebraska. Burgamy illegally sold prescription drugs through his Darknet vendor account to customers nationwide, and claimed at one point that he made nearly $1 million total. Burgamy and Wilson agreed that Burgamy and another individual would carry multiple firearms during the attack operation and use explosives, specifically Molotov cocktails enhanced with Styrofoam as a thickening agent, to burn the victim pharmacy down in furtherance of their drug trafficking scheme. Law enforcement agents seized thousands of opioid pills, eight unsecured firearms, including two loaded AR-15 assault rifles with high capacity magazines, and over $19,000 cash. Prior to Burgamy’s arrest in April 2020, which uncovered and thwarted the firebombing plot, Burgamy and Wilson fully intended on the attack occurring after COVID-19 restrictions were lifted.
     
  • Aaron Brewer, 39, of Corsicana, Texas, was charged with conspiracy to possess with intent to distribute a controlled substance and distribution of a controlled substance in a two-count indictment returned by a grand jury in the Northern District of Texas. According to court documents, the defendant allegedly sold cocaine, heroin, and other drugs via the dark web. He allegedly accepted payment in cryptocurrency, primarily bitcoin, and then shipped the drugs to customers’ addresses through the U.S. mail and other shipping services.  Following Mr. Brewer’s arrest on July 2, agents with the U.S. Postal Inspection Service and FBI Dallas Field Office seized roughly 650 grams of black tar heroin, cocaine, and OxyContin, two computers, and more than $870 in postage stamps, as well as a ledger outlining 757 drug shipments sent to 609 unique addresses between December 2019 and March 2020.

An indictment and criminal complaint merely alleges that crimes have been committed. The defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

Operation DisrupTor was a collaborative initiative across JCODE members, including the Department of Justice; Federal Bureau of Investigation (FBI); U.S. Drug Enforcement Administration (DEA); U.S. Postal Inspection Service (USPIS); U.S. Immigration and Customs Enforcement (ICE)’s Homeland Security Investigations (HSI); U.S. Customs and Border Protection (CBP); Financial Crimes Enforcement Network (FinCEN); Bureau of Alcohol, Tobacco, and Firearms (ATF); Naval Criminal Investigative Service (NCIS) and Department of Defense (DOD). Local, state and other federal agencies also contributed to Operation DisrupTor investigations.  The investigations leading to Operation DisrupTor were significantly aided by essential support and coordination by the Department of Justice’s multi-agency Special Operations Division, the Criminal Division’s Computer Crime and Intellectual Property Section, Narcotic and Dangerous Drug Section, and Organized Crime and Gang Section, the Justice Department’s Office of International Affairs, the National Cyber Joint Investigative Task Force (NCJITF), Europol and its Dark Web team and international partners Eurojust, Austrian Federal Investigation Bureau (Bundeskriminalamt), Cyprus Police (Αστυνομία Κύπρου), German Federal Criminal Police Office (Bundeskriminalamt), Canada’s Royal Canadian Mounted Police, Portuguese Judicial Police (Polícia Judiciária), Dutch Police (Politie), Swedish Police (Polisen), the British National Crime Agency, Australia’s Western Australia Police Force and Australian Criminal Intelligence Commission.

Federal prosecutions are being conducted in more than 20 Federal districts, including: the Central District of California, the Eastern District of California, the Northern District of California, the Southern District of California, the District of Colorado, the District of Columbia, the District of Connecticut, the Middle District of Florida, the Southern District of Florida, the Northern District of Georgia, the District of Hawaii, the Western District of Missouri, the District of New Jersey, the Western District of North Carolina, the Northern District of Ohio, the Southern District of Ohio, District of Oregon, the Western District of Pennsylvania, the Northern District of Texas, the Eastern District of Virginia, the District of the Virgin Islands and the Western District of Washington.

JCODE is an FBI-led Department of Justice initiative, which works closely with the DEA-led, multi-agency, Special Operations Division to support, coordinate and de-conflict investigations targeting for disruption and dismantlement of the online sale of illegal drugs, especially fentanyl and other opioids. Additionally, JCODE targets the trafficking of weapons and other illicit goods and services on the internet. Operation DisrupTor illustrates the investigative power of federal and international partnerships to combat the borderless nature of online criminal activity.

Documents related to this announcement can be viewed here.

The year 2020 marks the 150th anniversary of the Department of Justice.  Learn more about the history of our agency at www.Justice.gov/Celebrating150Years.

News Network

  • Justice Department Seeks to Shut Down Georgia Return Preparer
    In Crime News
    The United States has filed a complaint in the U.S. District Court for the Middle District of Georgia, Macon Division, seeking to bar an Irwinton, Georgia, tax return preparer from preparing tax returns for others.
    [Read More…]
  • Last defendant convicted in nationwide synthetic narcotics distribution
    In Justice News
    Read full article at: [Read More…]
  • Remarks by Attorney General William P. Barr at a Press Conference Announcing the Results of Operation Crystal Shield
    In Crime News
    Remarks as Delivered [Read More…]
  • Cybersecurity: Federal Agencies Need to Implement Recommendations to Manage Supply Chain Risks
    In U.S GAO News
    What GAO Found Federal agencies continue to face software supply chain threats. In December 2020, the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency issued an emergency directive requiring agencies to take action regarding a threat actor that had been observed leveraging a software supply chain compromise of a widely used enterprise network management software suite—SolarWinds Orion. Subsequently, the National Security Council staff formed a Cyber Unified Coordination Group to coordinate the government response to the cyberattack. The group took a number of steps, including gathering intelligence and developing tools and guidance, to help organizations identify and remove the threat. During the same month that the SolarWinds compromise was discovered, GAO reported that none of 23 civilian agencies had fully implemented selected foundational practices for managing information and communication technology (ICT) supply chain risks—known as supply chain risk management (SCRM) (see figure). Twenty-three Civilian Agencies' Implementation of Information and Communication Technology (ICT) Supply Chain Risk Management (SCRM) Practices GAO stressed that, as a result of not fully implementing the foundational practices, the agencies were at a greater risk that malicious actors could exploit vulnerabilities in the ICT supply chain, causing disruptions to mission operations, harm to individuals, or theft of intellectual property. Accordingly, GAO recommended that each of the 23 agencies fully implement these foundational practices. In May 2021, GAO received updates from six of the 23 agencies regarding actions taken or planned to address its recommendations. However, none of the agencies had fully implemented the recommendations. Until they do so, agencies will be limited in their ability to effectively address supply chain risks across their organizations. Why GAO Did This Study Federal agencies rely extensively on ICT products and services (e.g., computing systems, software, and networks) to carry out their operations. However, agencies face numerous ICT supply chain risks, including threats posed by malicious actors who may exploit vulnerabilities in the supply chain and, thus, compromise the confidentiality, integrity, or availability of an organization's systems and the information they contain. Recent events involving a software supply chain compromise of SolarWinds Orion, a network management software suite, and the shutdown of a major U.S. fuel pipeline due to a cyberattack highlight the significance of these threats. GAO was asked to testify on federal agencies' efforts to manage ICT supply chain risks. Specifically, GAO (1) describes the federal government's actions in response to the compromise of SolarWinds and (2) summarizes its prior report on the extent to which federal agencies implemented foundational ICT supply chain risk management practices. To do so, GAO reviewed its previously published reports and related information. GAO has ongoing work examining federal agencies' responses to SolarWinds and plans to issue a report on this in fall 2021.
    [Read More…]
  • Senior State Department Official On the Women’s Global Development and Prosperity (W-GDP) Initiative
    In Women’s News
    Office of the [Read More…]
  • Monaco National Day
    In Crime Control and Security News
    Michael R. Pompeo, [Read More…]
  • Huawei CFO Wanzhou Meng Admits to Misleading Global Financial Institution
    In Crime News
    The Chief Financial Officer of Huawei Technologies Co. Ltd., Wanzhou Meng, 49, of the People’s Republic of China (PRC), appeared today in federal district court in Brooklyn, entered into a deferred prosecution agreement (DPA) and was arraigned on charges of conspiracy to commit bank fraud and conspiracy to commit wire fraud, bank fraud and wire fraud.
    [Read More…]
  • Capital One CEO to Pay Civil Penalty for Violating Antitrust Pre-Transaction Notification Requirements
    In Crime News
    The Justice Department’s Antitrust Division, at the request of the Federal Trade Commission (FTC), filed a civil antitrust lawsuit today in U.S. District Court for the District of Columbia, against Richard D. Fairbank, the CEO of Capital One Financial Corporation, for violating the pre-transaction notification and waiting period requirements of the Hart-Scott-Rodino Act of 1976 (HSR Act) when he acquired voting securities of Capital One in 2018. At the same time, the department filed a proposed settlement, subject to approval by the court, under which Fairbank has agreed to pay a $637,950 civil penalty to resolve the lawsuit.
    [Read More…]
  • [Protest of Air Force Contract Award for Computer Graphics]
    In U.S GAO News
    A firm protested an Air Force contract award for computer graphics, contending that the Air Force: (1) failed to upgrade its bid as a result of changes it made to its final bid; (2) unreasonably determined that the awardee's bid was a low risk; and (3) unreasonably made award to a higher bidder. GAO held that: (1) while evaluating the protester's initial bid, the Air Force properly took into consideration the changes the protester would make to its final bid; (2) the protester failed to prove that the Air Force unreasonably determined that the awardee's bid was low risk; and (3) Air Force reasonably made award to a higher, technically superior bidder. Accordingly, the protest was denied.
    [Read More…]
  • Secretary Blinken’s Call with UK Foreign Secretary Raab
    In Crime Control and Security News
    Office of the [Read More…]
  • Department of State Announces Online Publication of 2019 Digest of United States Practice in International Law
    In Crime Control and Security News
    Office of the [Read More…]
  • Secretary Blinken’s Travel to Latvia and Sweden
    In Crime Control and Security News
    Ned Price, Department [Read More…]
  • United States Files Suit Against California Skilled Nursing Chain and its Owner for Allegedly Paying Illegal Kickbacks to Physicians
    In Crime News
    The United States filed a complaint in the U.S. District Court for the Central District of California yesterday under the False Claims Act against Paksn Inc.; Prema Thekkek, one of its owners; and seven skilled nursing facilities (SNFs) owned by Thekkek and/or operated by Paksn. Those seven SNFs are Bay Point Healthcare Center, Gateway Care & Rehabilitation Center, Hayward Convalescent Hospital, Hilltop Care & Rehabilitation Center, Martinez Convalescent Hospital, Park Central Care & Rehabilitation Hospital, and Yuba Skilled Nursing Center.
    [Read More…]
  • VA Health Care: Preliminary Findings on the Department of Veterans Affairs Health Care Budget Formulation for Fiscal Years 2005 and 2006
    In U.S GAO News
    This report documents the information we provided to Congress in a briefing on February 2, 2006, in response to a request concerning the Department of Veterans Affairs (VA) internal budget formulation process. This includes information that VA develops for its budget submission to the Office of Management and Budget (OMB), but it does not include information on subsequent interactions that occur between VA and OMB. We will do additional work to incorporate information from OMB and complete our analysis in a report to be issued at a later date. Congress requested information on VA's budget formulation process because of its interest in ensuring that VA's budget forecasts are accurate and based on valid patient estimates. In response to the request for information on VA's internal budget formulation process, this report provides the following for fiscal years 2005 and 2006: (1) a description of VA's process for developing its budget submission to OMB for its medical programs, and the role of VA's actuarial model; (2) a description of the medical program activities cited by VA as needing additional funding, and how VA identified these activities; and (3) key factors in VA's budget formulation process that contributed to the requests for additional funding.VA's internal process for formulating the medical programs funding requests was informed by, but not driven by, projected demand. VA projected costs based on projected demand for medical care under current policy. Throughout the process, VA compared projected costs to its anticipated request level for the OMB submission and made adjustments to address the difference. VA officials stated that this was done in two ways: through cost-saving policy proposals, such as assessing an annual health care enrollment fee, and management efficiencies. After making adjustments to address the difference between projected costs and its anticipated request level, VA developed its budget submission for OMB. VA later cited a number of activities as needing additional funding based on programmatic priorities and an analysis of expenditure data. Among the activities that were cited for fiscal year 2005 was $273 million for veterans returning from Iraq and Afghanistan; $226 million for long-term care; and almost $400 million for increases in the number of patients, as well as increases in both utilization and intensity of care. For the fiscal year 2006 budget, VA cited $677 million to cover a 2 percent increase in the number of patients, $600 million to correct VA's estimate for long-term care costs, $400 million for an unexpected 1.2 percent increase in average cost per patient, and $300 million to replace funds VA planned to carry over from fiscal year 2005 to fiscal year 2006. VA officials said that they chose to highlight activities that were of high programmatic priority and could be supported by workload and expenditure data (e.g. veterans returning from Iraq and Afghanistan). They also reviewed spending and workload trends to determine whether spending trends were on target or whether adjustments were needed. An unrealistic assumption, errors in estimation, and insufficient data were key factors in VA's budget formulation process that contributed to the requests for additional funding. According to VA, an unrealistic assumption about the speed with which VA could implement a policy to reduce nursing home patient workload in VA-operated nursing homes for fiscal year 2005 led to a need for additional funds. VA officials told us that errors in estimating the effect of a nursing home policy to reduce workload in all three of its nursing home settings--VA-operated nursing homes, community nursing homes, and state veterans' nursing homes--accounted for a request for additional funding for fiscal year 2006. VA officials said that the error resulted from calculations being made in haste during the OMB appeal process. Finally, VA officials told us that insufficient data on certain activities contributed to the requests for additional funds for both years. For example, inadequate data on veterans returning from Iraq and Afghanistan resulted in an underestimate in the initial funding request.
    [Read More…]
  • Promoting Accountability and Responding to Violence against Protestors in Burma
    In Crime Control and Security News
    Antony J. Blinken, [Read More…]
  • Department of Energy: Improvements Needed to Strengthen Strategic Planning for the Acquisition Workforce
    In U.S GAO News
    What GAO Found The Department of Energy (DOE) is one of the largest civilian contracting agencies in the federal government, with about 80 percent of its annual obligations for contracts. Staff in most federal positions in DOE are involved in the acquisition process, according to officials from offices included in GAO's review—the Office of Science, the Office of Environmental Management (EM), and the National Nuclear Security Administration (NNSA). Some of these staff, such as contracting officers, hold federal or DOE acquisition certifications. DOE generally requires acquisition-related training only for certified staff—which represent about 15 percent of DOE's workforce (see figure)—and maintains training requirements for only these staff through the agency's Acquisition Career Management Program. Numbers of DOE Staff with Acquisition Certifications, as of March 2021 DOE generally does not require acquisition-related training for noncertified staff, many of whom may play a critical role in DOE's acquisition process. Office of Federal Procurement Policy guidance states that agencies should consider the functions performed by staff members, such as requirements development by a technical expert, and include any significant acquisition-related positions in their acquisition training programs. By reviewing the criteria for inclusion in its Acquisition Career Management Program and developing training requirements for noncertified staff that meet these criteria, DOE can better ensure it has the capacity to oversee its contracts. The three DOE offices included in GAO's review have each implemented two of the five leading practices for effective strategic planning for their acquisition workforces, and have partially implemented the remaining three practices. For example, these offices have taken some steps to identify workforce need, but have not fully identified skill and competency gaps—including types and numbers of positions required to close gaps—for their acquisition workforces, as recommended by leading practices. Further, senior DOE and NNSA officials have raised concerns that they do not have enough staff or staff with the right skills in the acquisition workforce to properly oversee contracts. However, NNSA has conducted limited evaluations of gaps in skills and competencies for some positions in its acquisition workforce, and the other offices in GAO's review have not conducted such analyses. With a more complete and thorough understanding of skill and competency gaps for its acquisition workforce, DOE can improve the information it has available to develop its budget and other strategies to build a workforce with the right skills and of the right size to address the agency's long-standing issues with contract management. Why GAO Did This Study DOE's federal acquisition workforce is responsible for managing risks throughout the contracting, or acquisition, process. GAO designated DOE contract and project management as a high-risk area because of DOE's record of inadequate contract management. Senate Report No. 116-48 accompanying the National Defense Authorization Act for Fiscal Year 2020 includes a provision for GAO to review issues affecting DOE's acquisition workforce. This report examines (1) the positions included in DOE's acquisition workforce and the extent to which this workforce receives acquisition-related training and (2) the extent to which DOE has implemented leading practices for effective strategic planning for its acquisition workforce. GAO's review included the Office of Science, EM, and NNSA, which represented over 75 percent of DOE obligations for contracts in fiscal year 2019. GAO reviewed regulations, policies, and workforce planning documents; interviewed officials; and compared information to leading practices on workforce planning.
    [Read More…]
  • Former Mexican governor sent to US prison for money laundering
    In Justice News
    A former Coahuila, [Read More…]
  • Two Companies and Nine Individuals Indicted for Alleged Large-Scale Visa Fraud Employment Scheme
    In Crime News
    An indictment returned by a federal grand jury in the Southern District of Georgia has been unsealed charging two businesses and nine of their officers and managers located across the country for their roles in an alleged conspiracy to defraud the U.S. government and commit various fraud and criminal immigration offenses for profit.
    [Read More…]
  • Dark Web Child Pornography Facilitator Sentenced to 27 Years in Prison for Conspiracy to Advertise Child Pornography
    In Crime News
    A dual national of the United States and Ireland was sentenced yesterday to 324 months, or 27 years, in federal prison followed by a lifetime of supervised release for conspiracy to advertise child pornography.
    [Read More…]
  • The United States Welcomes the Breakthrough To Restore Gulf and Arab Unity
    In Crime Control and Security News
    Michael R. Pompeo, [Read More…]

Crime

Network News © 2005 Area.Control.Network™ All rights reserved.