Sridevi Aiyaswamy, Huge H1-B Visa Fraud

She has pled guilty.

Defendant was present and out of custody. Defendant was sworn-in by the Courtroom Deputy.
A Plea Agreement was EXECUTED in open court. Defendant ENTERED a guilty plea as to
Counts One (1), Two (2), and Four (4) of the Indictment (ECF No. 1). The Court ACCEPTED
the plea and found the Defendant made a knowing, intelligent, free and voluntary waiver of
rights and entry of a guilty plea. The Court also finds there is an independent and factual basis
for each count.

Sridevi Aiyaswamy, 50, lied on more than 25 I-129 forms used to apply for the visas, claiming workers had standing job offers from Cisco when in reality no such jobs existed.

San Jose Businesswoman Pleads Guilty To Tech Worker Visa Fraud

Defendant Submitted False Contracts, Forged Signatures of Cisco Employees to Federal Government In Scheme to Obtain H-1B Visas Under False Pretenses

SAN JOSE, CA – A San Jose businesswoman pleaded guilty in federal court today to three counts of visa fraud, announced U.S. Attorney Brian J. Stretch Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations (HSI) Special Agent in Charge Ryan L. Spradlin.  The guilty plea was accepted by the Honorable Lucy H. Koh, U.S. District Judge.

In pleading guilty, Sridevi Aiyaswamy, 50, of San Jose, admitted that between April 2010 and June 2013 she made numerous false statements, and submitted over 25 fraudulent documents, to the United States Citizenship and Immigration Services (USCIS) for the purpose of obtaining H-1B non-immigrant classifications for skilled foreign workers.  Acting as a petitioner on behalf of foreign worker beneficiaries, Aiyaswamy falsely represented in I-129 petitions that the foreign worker beneficiaries would be working at Cisco, an information technology and networking company in San Jose, Calif.  Aiayswamy further submitted counterfeit statements of work with forged signatures as back-up documentation to the I-129 petitions.  In fact, at the time she submitted these documents to USCIS, Aiyaswamy knew that the statements regarding offers of work from Cisco for these beneficiaries were false statements, and that Cisco had not made any offers of employment regarding these individuals.

A federal grand jury indicted Aiyaswamy on December 3, 2015, charging her with 34 counts of visa fraud, in violation of 18 U.S.C. § 1546(a).  Pursuant to today’s pea agreement, Aiyaswamy pleaded guilty to three of the counts of visa fraud and the government agreed to request dismissal of the remaining counts.

Aiyaswamy is currently free on bond.  Judge Koh scheduled her sentencing for November 15, 2017, at 9:15 a.m.  The maximum statutory penalty for visa fraud is 10 years in prison and a $250,000 fine.  However, any sentence following conviction will be imposed by the court only after consideration of the U.S. Sentencing Guidelines and the federal statute governing the imposition of a sentence, 18 U.S.C. § 3553.

Assistant U.S. Attorneys John Bostic and Jeff Nedrow are prosecuting the case with the assistance of Laurie Worthen and Susan Kreider.  The prosecution is the result of an investigation led by HSI.  U.S. Citizenship and Immigration Service’s Office of Fraud Detection and National Security also assisted with the investigation.

Abuse of the Civil Asset Forfeiture Law

Related reading: The Myth of Judicial Activism

The Supreme Court struck down less than 1% of the federal laws passed over a 50-year period.

*** Questions must be asked why is the Justice Department re-applying this program and to what end?

Criminal forfeiture is an action brought as a part of the criminal prosecution of a defendant. It is an in personam (against the person) action and requires that the government indict (charge) the property used or derived from the crime along with the defendant. If the jury finds the property forfeitable, the court issues an order of forfeiture.

For forfeitures pursuant to the Controlled Substances Act (CSA), Racketeer Influenced and Corrupt Organizations (RICO), as well as money laundering and obscenity statutes, there is an ancillary hearing for third parties to assert their interest in the property. Once the interests of third parties are addressed, the court issues a final forfeiture order.

Civil judicial forfeiture is an in rem (against the property) action brought in court against the property. The property is the defendant and no criminal charge against the owner is necessary.

Administrative forfeiture is an in rem action that permits the federal seizing agency to forfeit the property without judicial involvement. The authority for a seizing agency to start an administrative forfeiture action is found in the Tariff Act of 1930, 19 U.S.C. § 1607. Property that can be administratively forfeited is: merchandise the importation of which is prohibited; a conveyance used to import, transport, or store a controlled substance; a monetary instrument; or other property that does not exceed $500,000 in value.

Source: A Guide to Equitable Sharing of Federally Forfeited Property for State and Local Law Enforcement Agencies, U.S. Department of Justice, March 1994.

Participants And Roles

The Justice Asset Forfeiture Program includes activity by DOJ components and several components outside the Department. Each component plays an important role in the Program.

Department of Justice Components

Money Laundering and Asset Recovery Section (MLARS) of the Criminal Division holds the responsibility of coordination, direction, and general oversight of the Program. AFMLS handles civil and criminal litigation, provides legal support to the U.S. Attorneys’ Offices, establishes policy and procedure, coordinates multi-district asset seizures, administers equitable sharing of assets, acts on petitions for remission, coordinates international forfeiture and sharing and develops training seminars for all levels of government.

Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) enforces the federal laws and regulations relating to alcohol, tobacco, firearms, explosives and arson by working directly and in cooperation with other federal, state and local law enforcement agencies. ATF has the authority to seize and forfeit firearms, ammunition, explosives, alcohol, tobacco, currency, conveyances and certain real property involved in violation of law.

Drug Enforcement Administration (DEA) implements major investigative strategies against drug networks and cartels. Enforcement operations have resulted in significant seizure and forfeiture activity. A significant portion of DEA cases are adopted from state and local law enforcement agencies.

Federal Bureau of Investigation The FBI investigates a broad range of criminal violations, integrating the use of asset forfeiture into its overall strategy to eliminate targeted criminal enterprises. The FBI has successfully used asset forfeiture in White Collar Crime, Organized Crime, Drug, Violent Crime and Terrorism investigations. See the FBI Investigative Programs Asset Forfeiture Home Page for more information.

United States Marshals Service as the primary custodian of seized property for the Program. USMS manages and disposes of the majority of the property seized for forfeiture. See their Seized Asset Information page and their National Sellers List for more information.

United States Attorneys’ Offices (USAOs) are responsible for the prosecution of both criminal and civil actions against property used or acquired during illegal activity.

Asset Forfeiture Management Staff (AFMS): Has responsibility for management of the Assets Forfeiture Fund, the Consolidated Asset Tracking System (CATS), program-wide contracts, oversight of program internal controls and property management, interpretation of the Assets Forfeiture Fund statute, approval of unusual Fund uses, and legislative liaison on matters affecting the financial integrity of the Program.

Components Outside the Department of Justice

There are several organizations outside the Department of Justice who participate in the DOJ Asset Forfeiture Program. This list may change as additional agencies and offices become part of the DOJ program. These agencies participate in Judicial forfeitures only.

United States Postal Inspection Service (USPIS) makes seizures under their authority to discourage profit-motivated crimes such as mail fraud, money laundering and drug trafficking using the mail.

Food and Drug Administration FDA’s Office of Criminal Investigations has made seizures involving health care fraud schemes, counterfeit pharmaceuticals, illegal distribution of adulterated foods, and product tampering.

United States Department of Agriculture, Office of the Inspector General USDA’s Office of Inspector General’s (OIG) mission is to promote effectiveness and integrity in the delivery of USDA agricultural programs. Forfeiture is integrated as an important law enforcement tool in combating criminal activity affecting USDA programs.

Department of State, Bureau of Diplomatic Security The Bureau of Diplomatic Security investigates passport and visa fraud and integrates asset forfeiture into our strategy to target the profits made by vendors who provide fraudulent documentation or others who utilize fraudulent visas and/or passports to further their criminal enterprises.

Defense Criminal Investigative Service (DCIS) is the criminal investigative arm of the Inspector General of the Department of Defense. The mission of DCIS is to protect America’s War fighters by conducting investigations and forfeitures in support of crucial National Defense priorities that include homeland security/terrorism, product substitution, contract fraud, public corruption, computer crimes, and illegal technology transfers. ”

The Comprehensive Crime Control Act of 1984 established the Department of Justice Assets Forfeiture Fund to receive the proceeds of forfeiture and to pay the costs associated with such forfeitures, including the costs of managing and disposing of property, satisfying valid liens, mortgages, and other innocent owner claims, and costs associated with accomplishing the legal forfeiture of the property.

The Attorney General is authorized to use the Assets Forfeiture Fund to pay any necessary expenses associated with forfeiture operations such as property seizure, detention, management, forfeiture, and disposal. The Fund may also be used to finance certain general investigative expenses. These authorized uses are enumerated in 28 U.S.C. §524(c). Read more here.

Secret Service has Large Quiet Office in Hoover, Alabama

Primer: The U.S. Secret Service maintains Electronic Crimes Task Forces, which focus on identifying and locating international cyber criminals connected to cyber intrusions, bank fraud, data breaches, and other computer-related crimes. The Secret Service’s Cyber Intelligence Section has directly contributed to the arrest of transnational cyber criminals responsible for the theft of hundreds of millions of credit card numbers and the loss of approximately $600 million to financial and retail institutions. The Secret Service also runs the National Computer Forensic Institute, which provides law enforcement officers, prosecutors, and judges with cyber training and information to combat cyber crime.

HOOVER, Ala. — The classrooms, tucked above a municipal court here in the Birmingham suburbs, are a long way from the White House. But walk through a set of secured doors and into the futuristic-looking work space, and you will find an important wager by the agency best known for protecting presidents, the Secret Service.

Only it has almost nothing to do with earpiece-wearing agents or armored cars.

Though the Secret Service may be better known for keeping government executives safe, it also has a mandate to investigate and fight financial and other cybercrimes. And in an era of overworked protection details and nonstop cybercrime, it could use some help.

So here at the National Computer Forensics Institute, the pupils are hardened police officers, prosecutors and, occasionally, a judge. Instruction mimics what the agency teaches its own special agents. And tuition is not only free, but the Secret Service throws in travel, room, board and, for police officers, tens of thousands of dollars of technology to set up their own forensics labs back home.

Data is extracted from mobile phones for use in a class on prosecution in Hoover. Kevin D. Liles for The New York Times

In exchange, the Secret Service has quietly empowered a network of thousands of law enforcement officers across the country capable of processing digital evidence and indebted to the agency that taught them.

“The threat nature has increased in the world, and the threats are all more and more integrated with the digital world,” said Ben Bass, the special agent in charge of the institute. “So assimilating that into what we do is really important.”

The institute opened in 2008 as a partnership between the Secret Service and the state of Alabama, which contributed space and money for its construction. At the time, few state and local law enforcement agencies had the capability to process digital evidence found on computers and cellphones, even as it was exploding in volume and importance. That left agencies heavily reliant on the Secret Service and the F.B.I. for processing and created a years long backlog in many cases.

The Secret Service reasoned that it would be critical to the future of its mission — not to mention the effectiveness of local and state law enforcement — to try to change that. The program remains the only one of its kind and scale in the country.

Though its protective mission occupies the public’s attention, the Secret Service has been investigating crimes since 1865, when President Lincoln saw the need to create a small force of investigators within the Treasury Department to combat counterfeit currency that was undermining American markets. That mandate has changed and widened in the decades since, along with threats to the country’s financial systems, and the agency now investigates bank fraud, credit card fraud, identity theft, child exploitation as well as counterfeiting.

It does so with a reasonably small force. The majority of the Secret Service’s 3,300 agents work out of field offices. The F.B.I., by comparison, has more than 13,000. To amplify its effect, the agency relies on dozens of electronic and financial crimes task forces across the country, where local and state law officers and people in academia and businesses work alongside its own agents.

The help has arrived at the right time for the agency, where in recent years low morale, high attrition and more people to protect in more places have conspired to pinch resources. Because protection is a nonnegotiable task, investigations often take the hit.

The effect can be significant. In the 2016 fiscal year, the agency spent 65 percent of its time on protection and 35 percent on investigative work, according to calculations it shared with members of the House Oversight Committee. That was an election year, when protection demands are highest. But it appears the ratio for this fiscal year — which only included the last month or so of the campaign — has not changed much, with 60 percent of time going to protection through the end of May. Typically it would be about 40 percent for a post-campaign fiscal year.

Robert Novy, the deputy assistant director for investigations, said the task forces help ensure that cases continue to move forward regardless of protection demands. He also said that they have begun to free the Secret Service’s own staff to focus on larger-scale cyberthreats and high-dollar financial crimes.

“By elevating their capacities and capabilities, it allows us to focus on finding ways to counter more significant financial threats,” Mr. Novy said.

Still, building the program has proved challenging. A decade after it first opened its doors, the institute trains about 1,100 people a year. But it is running at between 30 percent and 40 percent of capacity because of a shortage of federal funds. For some programs, would-be enrollees can wait as long as three years.

Its financial outlook remains uncertain. President Trump’s 2018 budget proposal zeroed out the program, though Randolph D. Alles, the agency’s new director, told lawmakers last month that he considered it “critical” to the agency and would move money from elsewhere in his budget to pay for it if need be. At the same time, lawmakers in the House and Senate have introduced legislation that could stabilize its funding.

The institute’s finances appeared to be on few minds on a recent early summer day in Hoover, where a class of two dozen prosecutors sat in neat classroom rows, computers humming beside their feet, as data from the cellphone of a fictitious drug smuggler flashed onto their computer screens. The evidence was all there in ordered folders: call logs, texts, even compromising photographs of a would-be drug dealer, made visible by powerful software and a few patient instructors.

One room away and a few hours later, two dozen police officers packed into a wood-trimmed mock courtroom listened to another instructor hold forth from the witness stand on the ins and outs of being a good forensics witness. The key, he said, is balancing the use of technical details like “master boot records” and “disk partitions” with the bigger picture a less tech-savvy jury can more easily grasp.

“I need to be able to understand it so I can translate it when I go before a panel of 12 people,” said Jennifer Eugene, a prosecutor from New Jersey, describing her experience in front of a jury. “The law has not caught up with where the technology is.”

A five-week course for police on the basics of computer evidence recovery is the most popular, and graduates of the course leave here with $28,000 worth of technology and the ability to search seized computers for evidence of a crime. A similar course on mobile devices is growing in popularity. And more advanced courses cover network intrusion.

Prosecutors and judges can take shorter courses meant to familiarize them with digital evidence, which is still relatively new to many courtrooms.

But the mutual benefits of the program were on display, too. Frank Garibay, a detective with the San Antonio Police Department who had returned to the institute as a proctor after taking coursework himself, said his training here had transformed what his department could do.

It had also meant that when officials from the Texas Rangers and Homeland Security Investigations zeroed in on an illegal gambling ring in Texas, they could turn to the Secret Service’s San Antonio-based electronic crimes task force, including Mr. Garibay, for help.

The Secret Service paid for members of its task force to travel to the small South Texas town of Falfurrias for a weekend to set up a war room to process digital evidence.

The operation ended up taking down about a dozen illegal casinos, recovered almost $6 million, exposed drug and human trafficing rings, and ultimately public corruption.

 

July 27th the Next N. Korea Missile Launch?

US sees more signs North Korea is preparing another missile test

(CNN)North Korea appears to be preparing for another missile test, according to a US Defense official. The official said that transporter vehicles carrying ballistic missile launching equipment were seen arriving in Kusong, North Korea on Friday.

Infographic: Here's how missiles send deadly explosive payloads to targets around the world.
Source SPACE.com: All about our solar system, outer space and exploration

The official said that when such equipment is seen, a launch could occur within six days, which would coincide with the upcoming July 27 North Korean Holiday celebrating the armistice which ended the Korean War.
Last Wednesday, CNN reported that US intelligence indicated that North Korea is making preparations for another intercontinental ballistic missile (ICBM) or intermediate range missile test. Two administration officials familiar with the latest intelligence confirmed they’d seen indicators of test preparations. US satellites have detected new imagery and satellite-based radar emissions indicating that North Korea may be testing components and missile control facilities for another ICBM or intermediate launch, officials say.

(CNN)Hawaii is set to become the first state in the US to test an “attack- warning” system in the event of a North Korean nuclear missile strike.

Starting in November, Hawaii’s disaster warning plan will include a new protocol in case of a nuclear attack, CNN affiliate KNHL reports. But some are concerned the announcement will scare off tourists from visiting the island.
A “guidance summary” from the Hawaii Emergency Management Agency says residents will be alerted of nuclear detonation through siren alarms and flashing white lights. An Emergency Alert System will broadcast over television and radio frequencies as well. More here.
Kusong has been the site of North Korean missile tests in the past, including a May test of a KN-17 intermediate range missile which traveled almost 500 miles before splashing down in the Sea of Japan/East Sea, hitting the water about 60 miles from Vladivostok in eastern Russia, according to US officials.
The last major North Korean missile test took place on July 4, when Pyongyang launched what the US assessed to be an intercontinental ballistic missile.
***
The US military has grown increasingly concerned about the increased pace of North Korean missile testing while simultaneously underscoring that the US is capable of defending itself and its allies from North Korean missiles.
“They’re clearly on a path to develop an intercontinental ballistic missile that can reach the reach the United States and to match that with a nuclear weapon,” the Chairman of the Joint Chiefs of Staff, Gen. Joseph Dunford, told an audience Saturday at the Aspen Security Forum.
“What the North Koreans are capable of today is limited missile attack and we are capable of defending against a limited missile attack for our forces in South Korea, our South Korean allies, our Japanese allies, our forces in Okinawa, our forces in Guam and the American homeland,” Dunford added.
On Thursday, CIA Director Mike Pompeo offered some of the most aggressive comments yet from the Trump administration with regard to North Korean dictator Kim Jong Un.
“It would be a great thing to denuclearize the peninsula, to get those weapons off of that, but the thing that is most dangerous about it is the character who holds the control over them today,” Pompeo said at the Aspen Security Forum.
“As for the regime, I am hopeful we will find a way to separate that regime from this system,” Pompeo said. “The North Korean people I’m sure are lovely people and would love to see him go.”

Kushner’s Testimony to Senate Senate Intel Committee Staffers

Jared Kushner tells Congress: “I did not collude”

Axios: Giving his version of his Russia contacts for the first time, Jared Kushner says in an 11-page statement to congressional committees that he had “hardly any” contacts with Russians during the campaign, and regarded the meeting with a Russian lawyer at Trump Tower as “a waste of our time.”

  • Key quote: “I did not collude, nor know of anyone else in the campaign who colluded, with any foreign government. I had no improper contacts. I have not relied on Russian funds to finance my business activities in the private sector. I have tried to be fully transparent with regard to the filing of my SF-86 [security clearance] form, above and beyond what is required.”
  • Why it matters: The stakes for the congressional interviews are high for Kushner because the Trump son-in-law is of acute interest to special counsel Bob Mueller, and prosecutors can be expected to pick apart today’s statement.
  • Kushner has a 10 a.m.appointment with staff of the Senate Intelligence Committee, and his meeting tomorrow with the House Intelligence Committee. Both sessions are behind closed doors.

The most colorful passage: “[I]n looking for a polite way to leave and get back to my work,” he says in the statement, “I actually emailed an assistant from the meeting after I had been there for ten or so minutes and wrote ‘Can u pls call me on my cell? Need excuse to get out of meeting.’ I had not met the attorney before the meeting nor spoken with her since. I thought nothing more of this short meeting until it came to my attention recently.”

Another highlight: “With respect to my contacts with Russia or Russian representatives during the campaign, there were hardly any. … [T]he day after the election, I could not even remember the name of the Russian Ambassador. … I sent an email asking [Dmitri Simes of the Center for the National Interest, which hosted a Trump foreign policy speech], ‘What is the name of the Russian ambassador?'”

Other key points:

  • “When it became apparent that my father-in-law was going to be the Republican nominee for President, as normally happens, a number of officials from foreign countries attempted to reach out to the campaign. My father-in-law asked me to be a point of contact with these foreign countries. … [O]ver the course of the campaign, I had incoming contacts with people from approximately 15 countries.”
  • “I called on a variety of people with deep experience, such as Dr. Henry Kissinger, for advice on policy for the candidate, which countries/representatives with which the campaign should engage, and what messaging would resonate.”
  • “The first [campaign contact] that I can recall was at the Mayflower Hotel in Washington, D.C. in April 2016. … [T]he host of the event, Dimitri Simes, … introduced me to several guests, among them four ambassadors, including Russian Ambassador Sergey Kislyak. With all the ambassadors, including Mr. Kislyak, we shook hands, exchanged brief pleasantries.”
  • “Reuters news service has reported that I had two calls with Ambassador Kislyak at some time between April and November of 2016. While I participated in thousands of calls during this period, I do not recall any such calls with the Russian Ambassador. We have reviewed the phone records available to us and have not been able to identify any calls to any number we know to be associated with Ambassador Kislyak and I am highly skeptical these calls took place.”
  • “I had no ongoing relationship with the Ambassador before the election, and had limited knowledge about him.”
  • “The only other Russian contact during the campaign is one I did not recall at all until I was reviewing documents and emails in response to congressional requests for information.”
  • That was the Trump Tower meeting, and he said the invitation from Donald Trump Jr. “was on top of a long [email] back and forth that I did not read at the time. … Documents confirm my memory that this was calendared as ‘Meeting: Don Jr.| Jared Kushner.’ No one else was mentioned.”
  • “There was one more possible contact that I will note. On October 30, 2016, I received a random email from the screenname ‘Guccifer400.’ This email, which I interpreted as a hoax, was an extortion attempt and threatened to reveal candidate Trump’s tax returns and demanded that we send him 52 bitcoins in exchange for not publishing that information. I brought the email to the attention of a U.S. Secret Service agent on the plane we were all travelling on and asked what he thought. He advised me to ignore it and not to reply — which is what I did. The sender never contacted me again.”
  • “On November 16, 2016, my assistant received a request for a meeting from the Russian Ambassador. … The [Dec. 1] meeting occurred in Trump Tower, where we had our transition office, and lasted twenty [to] thirty minutes. Lt. General Michael Flynn (Ret.), who became the President’s National Security Advisor, also attended.
  • “I believed developing a thoughtful approach on Syria was a very high priority given the ongoing humanitarian crisis, and I asked if they had an existing communications channel at his embassy we could use where they would be comfortable transmitting the information they wanted to relay to General Flynn. The Ambassador said that would not be possible and so we all agreed that we would receive this information after the Inauguration. Nothing else occurred. I did not suggest a ‘secret back channel.'”
  • “My assistant reported that the Ambassador had requested that I meet with a person named Sergey Gorkov who he said was a banker and someone with a direct line to the Russian President who could give insight into how Putin was viewing the new administration and best ways to work together. I agreed to meet Mr. Gorkov because the Ambassador has been so insistent, said he had a direct relationship with the President, and because Mr. Gorkov was only in New York for a couple days.”
  • “The [Dec. 13] meeting with Mr. Gorkov lasted twenty to twenty-five minutes. … At no time was there any discussion about my companies, business transactions, real estate projects, loans, banking arrangements or any private business of any kind.”
  • “There has been a good deal of misinformation reported about my SF-86 [security clearance] form. As my attorneys and I have previously explained, my SF-86 application was prematurely submitted due to a miscommunication and initially did not list any contacts (not just with Russians) with foreign government officials.”
  • “[P]eople at my New York office were helping me find the information, organize it, review it and put it into the electronic form. They sent an email to my assistant in Washington, communicating that the changes to one particular section were complete; my assistant interpreted that message as meaning that the entire form was completed.
  • “At that point, the form was a rough draft and still had many omissions including not listing any foreign government contacts and even omitted the address of my father-in-law (which was obviously well known). Because of this miscommunication, my assistant submitted the draft on January 18, 2017.”
  • “The very next day, January 19, 2017, we submitted supplemental information to the transition, which confirmed receipt and said they would immediately transmit it to the FBI.”