December 8, 2021

News

News Network

Texas Man Sentenced to 40 Years in Prison for Running Child Obscenity Website

11 min read
<div>A Texas man was sentenced today in the Western District of Texas to 40 years in prison for multiple obscenity crimes involving children.</div>
A Texas man was sentenced today in the Western District of Texas to 40 years in prison for multiple obscenity crimes involving children.

More from: June 22, 2021

News Network

  • Real Estate Investor Pleads Guilty to Rigging Bids at Foreclosure Auctions
    In Crime News
    A California man pleaded guilty yesterday to rigging bids at public foreclosure auctions.
    [Read More…]
  • Climate Change: USAID Is Taking Steps to Increase Projects’ Resilience, but Could Improve Reporting of Adaptation Funding
    In U.S GAO News
    The U.S. Agency for International Development (USAID) provided at least $810 million to directly and indirectly support climate adaptation from fiscal years 2014 through 2018—the latest available data at the time of GAO's analysis. However, USAID ended new funding for programming activities that directly address climate adaptation (i.e., direct funding) in fiscal year 2017 in part due to a shift in administration priorities, according to agency officials. However, following a congressional directive in the fiscal year 2020 appropriations act, USAID restored direct funding for adaptation programming. GAO found that USAID did not consistently report all funding data for activities that indirectly addressed climate adaptation, which does not align with expectations in foreign assistance guidance and internal controls standards. USAID's direct adaptation assistance had the primary program goal of enhancing resilience and reducing vulnerability. For example, in the Philippines, a USAID activity assisted communities in preparing for extreme weather events by developing maps of potential hazards to aid in evacuation planning. USAID attributed funding that indirectly addresses climate adaptation assistance (i.e., indirect funding) from programs with other goals such as agriculture, where priorities include supporting food production and distribution. For example, in Guatemala, a USAID agricultural activity worked with farmers to transition to crops with greater economic benefits that are also drought tolerant. However, not all missions with indirect adaptation assistance reported these funding data and reporting has varied, in part, because the agency has not clearly communicated the expectation to do so. Without addressing this issue, USAID risks providing incomplete and inconsistent data to Congress and others. A Community Leader Shows the Hazard Map Prepared as Part of a U.S. Agency for International Development Project to Help Adapt to Climate Change in the Philippines Since October 2016, USAID has generally required projects and activities to conduct climate risk management, which is the process of assessing and managing the effects of climate change. USAID requires documentation of this process and GAO's review found 95 percent compliance for USAID's priority countries for adaption funding. USAID has experienced some challenges with its initial implementation of climate risk management and is assessing these challenges and identifying improvements. For example, mission officials said that some technical staff lack expertise to do climate risk management and that their environment offices had a small number of staff to provide assistance. To help staff conduct climate risk management, USAID is building staff capacity through trainings and is in the process of evaluating implementation of the policy and whether it requires any changes, among other efforts. USAID is the primary U.S. government agency helping countries adapt to the effects of climate change. USAID has provided this assistance through activities that directly address climate adaptation as well as indirectly through activities that received funding for other purposes, such as agriculture, but which also support climate adaptation goals. GAO was asked to review issues related to U.S. foreign assistance for climate adaptation. For USAID, this report examines (1) funding the agency provided for climate adaptation assistance in fiscal years 2014 through 2018, and (2) how climate risk management is implemented. GAO analyzed funding data and documentation of agency activities and climate risk management; interviewed agency and project officials; and conducted fieldwork in three countries receiving adaptation assistance—Guatemala, the Philippines, and Uganda. GAO selected these countries based on the amount of funding they received for climate adaptation activities, geographic diversity, and variety of observed and projected climate effects, among other factors. GAO recommends that USAID communicate to its missions and bureaus that they are expected to report all data on funding that indirectly addresses climate adaptation. USAID agreed with the recommendation and outlined a number of steps the agency plans to take to improve the reporting of these data. For more information, contact David Gootnick at (202) 512-3149 or gootnickd@gao.gov.
    [Read More…]
  • Statement by Attorney General Merrick B. Garland on Earth Day
    In Crime News
    On April 22, 1970, millions of people across America came together and sparked a movement that led to the enactment of many of our nation’s foundational environmental laws, including the Clean Air Act, the Endangered Species Act, the Clean Water Act, and the Safe Drinking Water Act.
    [Read More…]
  • Critical Infrastructure Protection: TSA Is Taking Steps to Address Some Pipeline Security Program Weaknesses
    In U.S GAO News
    What GAO Found Protecting the nation's pipeline systems from security threats is a responsibility shared by both the Transportation Security Administration (TSA) and private industry stakeholders. Prior to issuing a cybersecurity directive in May 2021, TSA's efforts included issuing voluntary security guidelines and security reviews of privately owned and operated pipelines. GAO reports in 2018 and 2019 identified some weaknesses in the agency's oversight and guidance, and made 15 recommendations to address these weaknesses. TSA concurred with GAO's recommendations and has addressed most of them, such as clarifying portions of its Pipeline Security Guidelines improving its monitoring of security review performance, and assessing staffing needs. As of June 2021, TSA had not fully addressed two pipeline cybersecurity-related weaknesses that GAO previously identified. These weaknesses correspond to three of the 15 recommendations from GAO's 2018 and 2019 reports. Incomplete information for pipeline risk assessments. GAO identified factors that likely limit the usefulness of TSA's risk assessment methodology for prioritizing pipeline security reviews. For example, TSA's risk assessment did not include information consistent with critical infrastructure risk mitigation, such as information on natural hazards and cybersecurity risks. GAO recommended that TSA develop data sources relevant to pipeline threats, vulnerabilities, and consequences of disruptions. As of June 2021, TSA had not fully addressed this recommendation. Aged protocols for responding to pipeline security incidents. GAO reported in June 2019 that TSA had not revised its 2010 Pipeline Security and Incident Recovery Protocol Plan to reflect changes in pipeline security threats, including those related to cybersecurity. GAO recommended that TSA periodically review, and update its 2010 plan. TSA has begun taking action in response to this recommendation, but has not fully addressed it, as of June 2021. TSA's May 2021 cybersecurity directive requires that certain pipeline owner/operators assess whether their current operations are consistent with TSA's Guidelines on cybersecurity, identify any gaps and remediation measures, and report the results to TSA and others. TSA's July 2021 cybersecurity directive mandates that certain pipeline owner/operators implement cybersecurity mitigation measures; develop a Cybersecurity Contingency Response Plan in the event of an incident; and undergo an annual cybersecurity architecture design review, among other things. These recent security directives are important requirements for pipeline owner/operators because TSA's Guidelines do not include key mitigation strategies for owner/operators to reference when reviewing their cyber assets. TSA officials told GAO that a timely update to address current cyber threats is appropriate and that they anticipate updating the Guidelines over the next year. Why GAO Did This Study The nation's pipelines are vulnerable to cyber-based attacks due to increased reliance on computerized systems. In May 2021 malicious cyber actors deployed ransomware against Colonial Pipeline's business systems. The company subsequently disconnected certain systems that monitor and control physical pipeline functions so that they would not be compromised. This statement discusses TSA's actions to address previous GAO findings related to weaknesses in its pipeline security program and TSA's guidance to pipeline owner/operators. It is based on prior GAO products issued in December 2018, June 2019, and March 2021, along with updates on actions TSA has taken to address GAO's recommendations as of June 2021. To conduct the prior work, GAO analyzed TSA documents; interviewed TSA officials, industry association representatives, and a sample of pipeline operators selected based on type of commodity transported and other factors; and observed TSA security reviews. GAO also reviewed TSA's May and July 2021 Pipeline Security Directives, TSA's Pipeline Security Guidelines, and three federal security alerts issued in July 2020, May 2021, and June 2021.
    [Read More…]
  • Georgia Correctional Officer Pleads Guilty to Civil Rights Offense for Assaulting Inmate
    In Crime News
    A Georgia correctional officer pleaded guilty today to violating the civil rights of an inmate.
    [Read More…]
  • Panama investigation leads to local child pornography plea
    In Justice News
    An 18-year-old [Read More…]
  • Man Convicted of Receiving, Soliciting, and Promoting Child Pornography
    In Crime News
    A federal jury convicted a Virginia man today for downloading images and videos depicting children as young as four years old being sexually abused and for utilizing the Darknet to solicit and promote child pornography.
    [Read More…]
  • United States Intervenes and Files Complaint in False Claims Act Suit Against Health Insurer for Submitting Unsupported Diagnoses to the Medicare Advantage Program
    In Crime News
    The United States has intervened and filed a complaint in the U.S. District Court for the Western District of New York under the False Claims Act against Independent Health Association, Independent Health Corporation (Independent Health), DxID LLC (DxID) and Betsy Gaffney, former CEO of DxID.
    [Read More…]
  • Deputy Secretary Sherman’s Participation in Roundtable on Apprenticeship in Switzerland
    In Crime Control and Security News
    Office of the [Read More…]
  • Ethiopia Travel Advisory
    In Travel
    Reconsider travel to [Read More…]
  • Mexican National Sentenced for Trafficking in Wildlife
    In Crime News
    A citizen of Mexico was sentenced today to three years in prison to be followed by three years of supervised release for his role in a conspiracy to smuggle protected reptiles from Mexico to the United States.
    [Read More…]
  • Secretary Blinken’s Call with German Foreign Minister Maas 
    In Crime Control and Security News
    Office of the [Read More…]
  • Owner of Oil Chem Inc. Sentenced for Clean Water Act Violation
    In Crime News
    The president and owner of Oil Chem Inc. was sentenced today to 12 months in prison for violating the Clean Water Act stemming from illegal discharges of landfill leachate — totaling more than 47 million gallons — into the city of Flint sanitary sewer system over an eight and a half year period.
    [Read More…]
  • Judge Rya Zobel to Receive 2020 Devitt Award
    In U.S Courts
    Senior U.S. District Judge Rya Zobel, who grew up in Nazi Germany and later became the first woman to serve as director of the Federal Judicial Center, is the recipient of the 2020 Edward J. Devitt Distinguished Service to Justice Award.
    [Read More…]
  • Special Presidential Envoy for Climate John Kerry’s Travel to Europe
    In Crime Control and Security News
    Office of the [Read More…]
  • Brazil Can Join the Growing Clean Network by Banning Huawei
    In Human Health, Resources and Services
    Keith Krach, Under [Read More…]
  • Electricity Grid Cybersecurity: DOE Needs to Ensure Its Plans Fully Address Risks to Distribution Systems
    In U.S GAO News
    What GAO Found The U.S. grid's distribution systems—which carry electricity from transmission systems to consumers and are regulated primarily by states—are increasingly at risk from cyberattacks. Distribution systems are growing more vulnerable, in part because their industrial control systems increasingly allow remote access and connect to business networks. As a result, threat actors can use multiple techniques to access those systems and potentially disrupt operations. (See fig.) However, the scale of potential impacts from such attacks is not well understood. Examples of Techniques for Gaining Initial Access to Industrial Control Systems Distribution utilities included in GAO's review are generally not subject to mandatory federal cybersecurity standards, but they, and selected states, had taken actions intended to improve distribution systems' cybersecurity. These actions included incorporating cybersecurity into routine oversight processes and hiring dedicated cybersecurity personnel. Federal agencies have supported these actions by, for example, providing cybersecurity training and guidance. As the lead federal agency for the energy sector, the Department of Energy (DOE) has developed plans to implement the national cybersecurity strategy for the grid, but these plans do not fully address risks to the grid's distribution systems. For example, DOE's plans do not address distribution systems' vulnerabilities related to supply chains. According to officials, DOE has not fully addressed such risks in its plans because it has prioritized addressing risks to the grid's generation and transmission systems. Without doing so, however, DOE's plans will likely be of limited use in prioritizing federal support to states and industry to improve grid distribution systems' cybersecurity. Why GAO Did This Study Protecting the reliability of the U.S. electricity grid, which delivers electricity essential for modern life, is a long-standing national interest. The grid comprises three functions: generation, transmission, and distribution. In August 2019, GAO reported that the generation and transmission systems—which are federally regulated for reliability—are increasingly vulnerable to cyberattacks. GAO was asked to review grid distribution systems' cybersecurity. This report (1) describes the extent to which grid distribution systems are at risk from cyberattacks and the scale of potential impacts from such attacks, (2) describes selected state and industry actions to improve distribution systems' cybersecurity and federal efforts to support those actions, and (3) examines the extent to which DOE has addressed risks to distribution systems in its plans for implementing the national cybersecurity strategy. To do so, GAO reviewed relevant federal and industry reports on grid cybersecurity risks and analyzed relevant DOE documents. GAO also interviewed a nongeneralizable sample of federal, state, and industry officials with a role in grid distribution systems' cybersecurity.
    [Read More…]
  • Secretary Antony J. Blinken with U.S. Ambassador to Senegal and Guinea-Bissau Tulinabo S. Mushingi and Senegalese Economy Minister Amadou Hott at an MOU Signing with U.S. Companies
    In Crime Control and Security News
    Antony J. Blinken, [Read More…]
  • Owner of Medical Laboratory Sentenced to Prison for Filing False Tax Returns
    In Crime News
    A Shreveport, Louisiana, business owner was sentenced to 40 months in prison on Sept. 30, 2020, for filing false tax returns, announced Principal Deputy Assistant Attorney General Richard E. Zuckerman of the Justice Department’s Tax Division and Acting U.S. Attorney for the Western District of Louisiana Alexander C. Van Hook.
    [Read More…]
  • Bank Supervision: FDIC Could Better Address Regulatory Capture Risks
    In U.S GAO News
    The Federal Deposit Insurance Corporation (FDIC) has designed policies to address the risk of regulatory capture by reducing the potential benefit to industry of capturing the examination process, reducing avenues of inducement, and promoting a culture of independence and public service (see figure). Framework for Reducing Risk and Minimizing Consequences of Regulatory Capture FDIC has several policies for documenting bank examination decisions that help promote transparent decision-making and assign responsibility for decisions. Such policies are likely to help reduce benefits to industry of capturing the examination process. However, GAO found that some examinations were not implemented consistent with FDIC policies and that gaps in FDIC policies limited their effectiveness. For example, GAO found that managers sometimes did not clearly document how they concluded that banks had addressed recommendations. By improving adherence to agency policies, FDIC management could better address threats to capture in the examination process. GAO found that FDIC has policies to address potential conflicts of interest that could help block or reduce avenues of inducement. For example, FDIC has post-employment conflict-of-interest policies designed to prevent former employees from exerting undue influence on FDIC and to reduce industry's ability to induce current FDIC employees with prospective employment arrangements. One such policy requires the agency to review the workpapers of examiners-in-charge who accept employment with banks they examined in the prior 18 months. However, FDIC has not fully implemented a process for identifying when to review the workpapers of departing examiners to assess whether independence has been compromised. In particular, FDIC does not have a process for collecting information about departing employees' future employment. By revising its examiner-departure processes, the agency could better identify when to initiate workpaper reviews. FDIC has identified regulatory capture as a risk as part of its enterprise risk management process. The agency has documented 11 mitigation strategies that could help address that risk. Identified mitigation strategies include rotating examiners-in-charge, national examination training, and ethics requirements. FDIC supervises about 3,300 financial institutions to evaluate their safety and soundness. Some analyses by academic researchers have identified regulatory capture in supervision as one potential factor contributing to the 2007–2009 financial crisis. Regulatory capture is defined as a regulator acting in the interest of the regulated industry rather than in the public interest. GAO was asked to review regulatory capture in financial regulation. This report examines FDIC's (1) processes for encouraging transparency and accountability in the bank examination process, (2) processes to minimize potential conflicts of interest among examination staff, and (3) agency-wide efforts to address the risks of regulatory capture and compromised independence. GAO reviewed FDIC's policies and enterprise risk management framework, analyzed bank examination workpapers, and interviewed supervisory staff. GAO is making four recommendations to FDIC related to managing the risk of regulatory capture, including improving documentation of banks' progress at addressing FDIC recommendations and revising examiner-departure processes. FDIC neither agreed nor disagreed with these recommendations, but described actions it would take in response to them. FDIC's actions, if fully implemented, would address two of the four recommendations. For more information, contact Michael Clements at (202) 512-8678 or clementsm@gao.gov.
    [Read More…]

Crime

Network News © 2005 Area.Control.Network™ All rights reserved.