IG Report: Improper Accounting at HUD, $516 Billion

What We Found  Full 126 page Inspector General Report is here.

Image result for julian castro hud

Of note, Speaker Boehner hired a law, Jonathan Turley to represent the House in a lawsuit, where Treasury under Barack Obama was ordered to take monies from other agencies to fund Obamacare and pay insurers. That lawsuit case is found here. Where is the case now? In May 2016, Collyer ruled that the payments were illegal. The case is already on appeal to the D.C. Circuit and will probably be argued in early 2017.

Meanwhile, how about fraud at HUD, where Julian Castro was Secretary? Julian is a radical and a LaRaza advocate. Further, Politico reported that Julian Castro’s name was floated early as a Hillary running mate.

Image result for julian castro hillary clinton   Back to the half a trillion dollars….

The total amounts of errors corrected in HUD’s notes and consolidated financial statements were

$516.4 billion and $3.4 billion, respectively. There were several other unresolved audit matters,

which restricted our ability to obtain sufficient, appropriate evidence to express an opinion.

These unresolved audit matters relate to (1) the Office of General Counsel’s refusal to sign the

management representation letter, (2) HUD’s improper use of cumulative and first-in, first-out

budgetary accounting methods of disbursing community planning and development program

funds, (3) the $4.2 billion in nonpooled loan assets from Ginnie Mae’s stand-alone financial

statements that we could not audit due to inadequate support, (4) the improper accounting for

certain HUD assets and liabilities, and (5) material differences between HUD’s subledger and

general ledger accounts. This audit report contains 11 material weaknesses, 7 significant

deficiencies, and 5 instances of noncompliance with applicable laws and regulations.

What We Recommend

In addition to recommendations made in audit reports 2017-FO-0001, 2017-FO-0002, and 2017-

FO-0003, we recommend that HUD (1) reassess its current consolidated financial statement and

notes review process to ensure that sufficient internal controls are in place to prevent and detect

errors, (2) evaluate the current content of HUD’s consolidated note disclosures to ensure

compliance with regulations and GAAP, and (3) develop a plan to ensure that restatements are

properly reflected in all notes impacted.

On November 15, 2016, we issued an independent auditor’s report1 stating that the U.S.

Department of Housing and Urban Development (HUD) was unable to provide final fiscal years

2016 and 2015 consolidated financial statements and accompanying notes in a timeframe that

would allow us to obtain sufficient, appropriate evidence to determine whether they were free

from material misstatement. We also reported on the delays encountered in the material

weakness, Weak Internal Controls Over Financial Reporting Led to Errors and Delays in the

Preparation of Financial Statements and Notes.2

The delays were due to insufficiently designed and implemented financial reporting processes

and internal controls that were put into place because of HUD’s transition of its core financial

system to a Federal shared service provider (FSSP). HUD inadequately planned and tested the

changes to HUD’s financial reporting process before the transition. Additionally, late

restatements performed by HUD’s component entities, the Government National Mortgage

Association (Ginnie Mae) and Federal Housing Administration (FHA), contributed to the delay

in providing final consolidated financial statements.3 As a result, we were unable to provide an

opinion on HUD’s fiscal years 2016 and 2015 financial statements. While there were other

material matters that supported our basis for disclaimer, this was the primary reason for our

disclaimer of opinion.

China/Russia Using the Same Cyber Operations Playbook?

As President Trump meets with Xi Jinping of China at Mar A Lago, perhaps he should point to these two conditions in earnest.

North Korean hackers seem to have managed to access a secret war masterplan by South Korea and the U.S. in a cyberattack last September, sources here said Monday.

By Lee Yong-soo: (the item posted below is copyright protected)

Chosun: One government source said Defense Ministry investigators questioned around 40 people over the hacking attack and it appears that part of the masterplan, dubbed OPLAN 5027, “leaked.” A Defense Ministry source said the hackers accessed reports containing portions of the plan, not the entire document.

Defense Minister Han Min-koo and other military officials last year downplayed the seriousness of the hacking attack, saying that only a small number of sensitive military secrets leaked out.

OPLAN 5027 was first drawn up in 1978, when the South Korea-U.S. Combined Forces Command was established, and updated every two years since 1994. It includes troop deployment plans, key North Korean targets, strategies and military control of facilities in the North.

A military official said “discussions are still taking place” whether the plan has to be overhauled now the North has seen chunks of it.

The ministry found out about the leak while investigating a new computer virus in September that attacked the vaccine server at the military cyber command.

Investigators discovered that the Defense Ministry’s Internet and Intranet servers were infected with the same malware, affecting the minister’s own computer and around 2,500 computers with Internet access and 700 connected to the Intranet.

At the time, the ministry said only that hackers accessed “some military information, including sensitive information” and that North Korea appears to be responsible.

The hackers tried to attack the main server of the Defense Integrated Data Center, which serves as the cyber nerve center of South Korea’s defense system.

 

***

China’s Information Warriors Are Growing More Disciplined, Say US Cyber Leaders

And some U.S. cyber leaders worry that the American military’s approach is too reactive and defensive.

When President Trump meets this week with his Chinese counterpart, President Xi Jinping, he’ll be engaging with a leader who commands an increasingly disciplined and persistent information-warfare force.

In December 2015, the Chinese military stood up a Strategic Support Force as part of a larger series of reforms. Essentially a Chinese version of U.S. Cyber Command, the new force focuses on war in the electromagnetic spectrum, space, and cyberspace.  “All these are the new fields that determine whether the PLA can win in the future battlefield,” Chinese officials told state media.

The new force’s key focus is building capabilities to disrupt U.S. military operations, according to Martin Libicki, who leads cybersecurity studies at the U.S. Naval Academy. In January China announced that the country will develop the world’s first exascale super computer by the end of the year.

The move follows years of steady and incremental improvements in information operations, Vice Adm. Tim White, commander of the U.S. Cyber National Mission Force, said Tuesday at the Navy League’s Sea-Air-Space conference. “They are building what I would call campaigns. They are being very thoughtful about it and being purposeful in their approach and there is some design that they are organizing themselves,” he said of adversarial nations such as China but also Russia.  “It’s not just a single mission, point of time, or place. It’s interwoven together to achieve a national purpose.”

By contrast, White worries the U.S. military is thinking too defensively. He believes the Pentagon should work toward a more disciplined, consistent response, and shift from a “broadly reactive” posture “to something we are doing something as a result of our own campaign and planning efforts.”

“They’re on the field and we are figuring out how to get on that field,” White  said. “What nations are doing in this space, it’s more coordinated. It’s more interoperable from their perspective. It’s more structured and it’s more integrated.”

Industrial espionage from China appears to have  waned since Barack Obama and Xi signed an agreement in September 2015. But attacks have not vanished entirely. Between March and May of last year, Chinese hackers deployed a backdoor into a government services company, stole important credentials, and attempted to gain access to U.S. military secrets, according to the FireEye cyber security group.

Without speaking specifically about that incident, Vice Adm. Jan Tighe, deputy chief of naval operations for information warfare and the director of naval intelligence, said that many of the attacks, pings, intrusion attempts and probe “appear to be part of deliberate campaigns” of adversarial nation-state activities against Western targets.

How to fight them off? The head of U.S. Cyber Command, Adm. Michael Rogers, has suggested giving more authority to lower-ranking service personnel. The Navy anticipates that all 40 of the Navy’s cyber mission force teams will reach full operational capability by 2018.

Navy leaders at Sea-Air-Space also said  artificial intelligence would play a bigger role in attacking and defending networks.

“I would not say we see new and exquisite DARPA-like capabilities yet,” emerging out of China in terms of artificial intelligence specifically for information warfare, according to White. “But I do think it will be inevitable because you’re not constrained by physics.”

Meanwhile, the U.S. military is exploring the use of cognitive computing and deep learning to better understand network vulnerabilities and predict attacker behavior, according to Vice Adm. Michael Gilday, who leads the Navy’s 10th Fleet  and Cyber Command, in accordance with phase II of the Command’s strategic plan to 2020, first laid out in 2015.

Marine Maj. Gen. Lori Reynolds, the commander of Marine Forces Cyber Command also maid a plea to industry. “Anything we can do to automate the intelligence cycle … that’s the right investment,”

But Military cyber leaders say that the United States and China will likely put artificial intelligence to different uses in information warfare. Automation can and probably should take over much defensive work to better keep up with the speed of attacks. But the use of offensive cyber weapons will still involve human decision making for the United States military. They could not guarantee the same of China.

AI can absolutely tighten your ability to make a decision inside your enemy’s ability to make a decision,” said Gilday.

Defense One asked Gilday and Tighe if they were seeing adversarial nations attempt to automate the use of offensive cyber weapons. They declined to respond.

Russian Spy Buryakov Deported, and that is it?

You mean there was no swap or something for this spy? How about an apology for this constant problem of our U.S. diplomats around the globe? And most of the country thinks that Russia does nothing wrong or  intercepting phone calls of foreign agents that are occurring with Americans is wrong and names should not be requested to be unmasked. How about insider threats? Okay, well read on….

Russian intelligence and security services have been waging a campaign of harassment and intimidation against U.S. diplomats, embassy staff and their families in Moscow and several other European capitals that has rattled ambassadors and prompted Secretary of State John F. Kerry to ask Vladimir Putin to put a stop to it.

At a recent meeting of U.S. ambassadors from Russia and Europe in Washington, U.S. ambassadors to several European countries complained that Russian intelligence officials were constantly perpetrating acts of harassment against their diplomatic staff that ranged from the weird to the downright scary. Some of the intimidation has been routine: following diplomats or their family members, showing up at their social events uninvited or paying reporters to write negative stories about them.

But many of the recent acts of intimidation by Russian security services have crossed the line into apparent criminality. In a series of secret memos sent back to Washington, described to me by several current and former U.S. officials who have written or read them, diplomats reported that Russian intruders had broken into their homes late at night, only to rearrange the furniture or turn on all the lights and televisions, and then leave. One diplomat reported that an intruder had defecated on his living room carpet. More here.

Russian banker convicted in U.S. spy ring deported to Moscow

A Russian banker convicted last year in the United States for involvement in a spy ring operating in New York City has been deported to Moscow, a U.S. law enforcement agency said on Wednesday.

Evgeny Buryakov, a former New York banker who was convicted in federal court of conspiring to act in the United States as an agent of the Russian Federation, is shown in this handout photo sitting on a commercial flight, escorted by deportation officers and turned over to Russian authorities, April 5, 2017.    United States Immigration and Customs Enforcement (ICE)/Handout via REUTERS

Evgeny Buryakov, a former New York banker who was convicted in federal court of conspiring to act in the United States as an agent of the Russian Federation, is shown in this handout photo sitting on a commercial flight, escorted by deportation officers and turned over to… REUTERS

Evgeny Buryakov, 42, was escorted to Russia by deportation officers aboard commercial flights and turned over to Russian authorities, the U.S. Immigration and Customs Enforcement (ICE) said in a statement.

Buryakov was arrested in January 2015 and charged with two others. U.S. prosecutors said they had worked with the Russian intelligence service and conspired to gather economic intelligence on behalf of Russia, including information about U.S. sanctions against Russia, and to recruit New York City residents as intelligence sources.

Buryakov, who worked at Russian state-owned Vnesheconombank, was sentenced in May by a U.S. district judge in Manhattan to 2-1/2 years in prison after pleading guilty to having conspired to act improperly as an agent for the Russian government.

He received credit for 16 months already spent in custody and was in line to be deported after completing his sentence.

***

Department of Justice
U.S. Attorney’s Office
Southern District of New York

FOR IMMEDIATE RELEASE
Friday, March 11, 2016

Evgeny Buryakov Pleads Guilty In Manhattan Federal Court In Connection With Conspiracy To Work For Russian Intelligence

Evgeny BURYAKOV, a/k/a “Zhenya,” Worked for Russian Intelligence Under “Non-Official Cover” as a Banker in Manhattan

            Preet Bharara, the United States Attorney for the Southern District of New York, and John P. Carlin, Assistant Attorney General for National Security, announced that EVGENY BURYAKOV, a/k/a “Zhenya,” pled guilty today to conspiring to act in the United States as an agent of the Russian Federation, without providing prior notice to the Attorney General.

U.S. Attorney Preet Bharara said:  “An unregistered intelligence agent, under cover of being a legitimate banker, gathers intelligence on the streets of New York City, trading coded messages with Russian spies who send the clandestinely collected information back to Moscow.  This sounds like a plotline for a Cold War-era movie, but in reality, Evgeny Buryakov pled guilty today to a federal crime for his role in just such a scheme.  More than two decades after the end of the Cold War, Russian spies still seek to operate in our midst under the cover of secrecy.  But in New York, thanks to the work of the FBI and the prosecutors in my office, attempts to conduct unlawful espionage will not be overlooked.  They will be investigated and prosecuted.”

Assistant Attorney General John P. Carlin said: “Evgeny Buryakov pleaded guilty to covertly working as a Russian agent in the United States without notifying the Attorney General.  Foreign nations who attempt to illegally gather economic and other intelligence information through espionage pose a direct threat to U.S. national security.  The National Security Division will continue to work with our law enforcement partners to identify and hold accountable those who illegally operate as covert agents within the United States.”

According to the Complaint, the Indictment, other court filings, and statements made during court proceedings:

Beginning in 2012, bURYAKOV worked in the United States as an agent of Russia’s foreign intelligence agency, known as the “SVR.”  BURYAKOV operated under “non-official cover,” meaning he entered and remained in the United States as a private citizen, posing as an employee in the Manhattan office of a Russian bank, Vnesheconombank, also known as “VEB.”  SVR agents operating under such non-official cover – sometimes referred to as “NOCs” – typically are subject to less scrutiny by the host government, and, in many cases, are never identified as intelligence agents by the host government.  As a result, a NOC is an extremely valuable intelligence asset for the SVR.

Federal law prohibits individuals from acting as agents of foreign governments within the United States without prior notification to the United States Attorney General.  Department of Justice records indicate that BURYAKOV never notified the United States Attorney General that he was, in fact, an agent of the Russian Federation.

BURYAKOV worked in New York with at least two other SVR agents, Igor Sporyshev and Victor Podobnyy.  From November 22, 2010, to November 21, 2014, Sporyshev officially served as a trade representative of the Russian Federation in New York.  From December 13, 2012, to September 12, 2013, Podobnyy officially served as an attaché to the Permanent Mission of the Russian Federation to the United Nations.  The investigation, however, showed that Sporyshev and Podobnyy also worked as officers of the SVR.  For their roles in the charged conspiracy, Sporyshev and Podobnyy were charged along with BURYAKOV in January 2015.  However, Sporyshev and Podbonyy no longer lived in the United States and thus were not arrested.

BURYAKOV’s Co-Conspirators Are Recorded Inside the SVR’s New York “Residentura”

During the course of the investigation, the FBI recorded Sporyshev and Podobnyy speaking inside the SVR’s offices in New York, known as the “Residentura.”

The FBI obtained the recordings after Sporyshev attempted to recruit an FBI undercover employee (“UCE-1”), who was posing as an analyst from a New York-based energy company.  In response to requests from Sporyshev, UCE-1 provided Sporyshev with binders containing purported industry analysis written by UCE-1 and supporting documentation relating to UCE-1’s reports, as well as covertly placed recording devices.  Sporyshev then took the binders to, among other places, the Residentura.

During subsequent recorded conversations, Sporyshev and Podobnyy discussed, among other things, Sporyshev’s SVR employment contract and his official cover position, their work as SVR officers, and the FBI’s July 2010 arrests of 10 SVR agents in the United States, known as the “Illegals.”

Sporyshev and Podobnyy also discussed BURYAKOV’s prior service with the SVR in South Africa.  BURYAKOV worked in South Africa between approximately 2004 and 2009, officially as a representative of VEB.  During a conversation about Sporyshev’s cover position in New York, Podobnyy related that, when BURYAKOV was working in South Africa, he had dinner with an SVR official and BURYAKOV’s supervisor at VEB and that, during the dinner, the SVR official told the VEB official that BURYAKOV was an “employee of the Service,” i.e., the SVR.

Further, Sporyshev and Podobnyy were recorded discussing, among other things, their (i) attempting to recruit New York City residents as intelligence sources for Russia; (ii) tasking BURYAKOV to gather intelligence; and (iii) transmitting intelligence reports prepared by BURYAKOV back to SVR headquarters in Moscow.

The directives from the SVR to BURYAKOV, Sporyshev, and Podobnyy, as well as to other covert SVR agents acting within the United States, included requests to gather intelligence on, among other subjects, potential United States sanctions against Russian banks and the United States’ efforts to develop alternative energy resources.

BURYAKOV’s Intelligence Taskings

Sporyshev was responsible for relaying intelligence assignments from the SVR to BURYAKOV.

BURYAKOV Drafts a Proposal for the SVR’s “Active Measures Directorate”

In May 2013, Sporyshev and Podbonyy were recorded discussing a proposal that BURYAKOV had drafted about a planned deal in which Bombardier Aircraft Company (“Bombadier”) in Canada would manufacture certain airplanes in Russia.  Sporyshev noted that Canadian “unions were resisting” and that BURYAKOV’s “proposal [was] for MS” – the SVR’s Active Measures Directorate – to “pressur[e] the unions and secur[e] from the company a solution that is beneficial to us.”  Other evidence developed during the investigation showed that, around the time of this conversation, BURYAKOV had conducted Internet searches relating to Bombardier and labor unions and, earlier, had obtained news articles regarding the planned deal and also attended a conference in Canada that Bombardier personnel also attended.

BURYAKOV Assists Sporyshev in Attempting to Obtain Sensitive Information About the New York Stock Exchange

Also, on May 21, 2013, Sporyshev called BURYAKOV, greeted him, and then described a tasking from “top sources” relating to three questions that ITAR-TASS, a Russian news agency, could put to the New York Stock Exchange.  Sporyshev called the defendant back approximately 20 minutes later.  During the call, BURYAKOV proposed questions regarding (i) exchange traded funds (ETFs), including the “mechanisms of their use to destabilize the market;” (ii) “curbing of trading robot activities;” and (iii) “technical parameters” and “other regulations directly related to the exchange.”  On July 8, 2013, a purported “bureau chief” for ITAR-TASS sent an email to an employee of the New York Stock Exchange that parroted the questions that BURYAKOV proposed to Sporyshev.

BURYAKOV Assists Sporyshev in Analyzing the Effect of Sanctions

Another example of an intelligence tasking occurred in late March 2014.  Specifically, on March 28, 2014, Sporyshev was recorded telling BURYAKOV that Sporyshev needed help researching the “effects of economic sanctions on our country,” among other things.  A few days later, on April 2, 2014, Sporyshev called BURYAKOV and stated, in an intercepted conversation, that he had not seen BURYAKOV in a while, and asked to meet BURYAKOV outside VEB’s office in Manhattan in 20 minutes.  A court-authorized search of BURYAKOV’s computer at VEB revealed that, at around the time of this telephone call, BURYAKOV conducted the following internet searches: “sanctions Russia consiquences” [sic] and “sanctions Russia impact.”

Two days later, on April 4, 2014, BURYAKOV called Sporyshev and, in an intercepted conversation, stated that he (BURYAKOV) “wrote you an order list,” and suggested that they meet.  Approximately 20 minutes later, Sporyshev met BURYAKOV in the driveway of BURYAKOV’s home.  Their encounter, which was captured by a video surveillance camera located near BURYAKOV’s residence, lasted approximately two minutes.  On the video footage, the defendants appeared to exchange a small object.

Clandestine Meetings and Communications

During the course of their work as covert SVR agents in the United States, BURYAKOV, Sporyshev, and Podobnyy regularly met and communicated using clandestine methods and coded messages, in order to exchange intelligence-related information while shielding their associations with one another as SVR agents.  These efforts were designed, among other things, to preserve their respective covers as an employee of VEB (BURYAKOV), a trade representative of the Russian Federation in New York (Sporyshev), and an attaché to the Permanent Mission of the Russian Federation to the United Nations (Podobnyy).

During the investigation, the FBI intercepted numerous calls between BURYAKOV and Sporyshev in which one of the men told the other that he needed to meet for some purpose, such as to transfer an item (such as a “ticket,” “book,” or “list,”) or for a purported social purpose.  In fact, BURYAKOV and Sporyshev used this coded language to signal that they needed to exchange intelligence information.

FBI surveillance revealed that, at some of these meetings between BURYAKOV and Sporyshev, they exchanged documents or other small items.  Notably, despite discussing on approximately a dozen occasions the need to meet to transfer “tickets,” BURYAKOV and Sporyshev were – other than one occasion where they discussed going to a movie – never observed attending, or discussing in any detail, events that would typically require tickets, such as a sporting event or concert.

BURYAKOV’s Receipt of Purported Official United States Government Documents

In the summer of 2014, BURYAKOV met multiple times with a confidential source working for the FBI (“CS-1”) and an FBI undercover employee (“UCE-2”).  Both CS-1 and UCE-2 purported to be working on a casino development project in Russia.

During a conversation recorded on July 22, 2014, Sporyshev warned BURYAKOV that meeting with UCE-2 might be a “trap” but authorized BURYAKOV to go ahead so he could make a better assessment.

During the course of the subsequent meetings, and consistent with his interests as a Russian intelligence agent, BURYAKOV demonstrated his strong desire to obtain information about subjects far outside the scope of his work as a bank employee.  During these meetings, BURYAKOV also accepted documents that were purportedly obtained from a U.S. government agency and which purportedly contained information potentially useful to Russia, including information about United States sanctions against Russia.

*                *                *

            BURYAKOV, 41, pled guilty to one count of conspiring to act in the United States as an agent of the Russian Federation without providing notice to the Attorney General, which carries a maximum sentence of five years.  This statutory maximum sentence is prescribed by Congress and is provided here for informational purposes only, as any sentence imposed on the defendant will be determined by the judge.

BURYAKOV will be sentenced on May 25, 2016, at 11:00 a.m.

U.S. Attorney Bharara praised the investigative work of the FBI’s Counterintelligence Division.

The prosecution is being handled by Assistant U.S. Attorneys Emil J. Bove III, Brendan F. Quigley, and Stephen J. Ritchin of the Terrorism and International Narcotics Unit of the U.S. Attorney’s Office for the Southern District of New York, with assistance provided by Senior Trial Attorney Heather Schmidt of the National Security Division’s Counterintelligence and Export Control Section.

Veteran Wounded Warriors Become Hunters, Great Story

In War on Child Porn, US Turns Wounded Soldiers Into Hunters

A group of military veterans take the oath at a U.S. Immigration and Customs Enforcement (ICE) ceremony, swearing them in to serve as analysts on child exploitation cases, at ICE headquarters in Washington, March 31, 2017. (B. Hamdard/VOA)

A group of military veterans take the oath at a U.S. Immigration and Customs Enforcement (ICE) ceremony, swearing them in to serve as analysts on child exploitation cases, at ICE headquarters in Washington, March 31, 2017. (B. Hamdard/VOA)

***

The language at a small graduation ceremony inside a federal office building in Washington Friday morning was militaristic: Fighting. Frontlines. Enemies. War.

For a fifth year, U.S. Immigration and Customs Enforcement (ICE) rather quietly has trained a small team of injured, wounded or sick military veterans for a different type of deployment – supporting the agency’s lesser-known investigative arm as analysts on child exploitation cases – the ones who will be able to take photos off a hard drive in a child pornography investigation, then help identify the perpetrator and build the case for an arrest.

“It is a battle. It is a war. And it needs to be,” said Daniel Ragsdale, ICE Deputy Director.

Since 2013, more than 100 veterans have learned computer forensics through the H.E.R.O. Child-Rescue Corps, an 11-week program in the nation’s capital, followed by a nearly year-long internship in ICE field offices around the country.

Chris Wooten, a U.S. Army ranger who was injured in a helicopter crash seven years ago while serving with a special operations regiment in Afghanistan — his fifth tour in Iraq and Afghanistan — felt like the program could return that sense of purpose and pride he felt serving in the military.

“I did have a lot of buddies who weren’t able to make it home, that were killed overseas or even individuals that took their own lives when they made it back just because they didn’t have that sense of purpose anymore,” he explains after the ceremony, before flying home to southwest Florida, where he starts his internship next week.

“I think this opportunity, even though we’re all wounded and can’t do our military job anymore, that this program allows us to serve our country again, and not only that, but help save some kids.”

‘Daunting’ task

It’s unpaid work that first year, working alongside agents to find suspects and build the cases, often looking at graphic, violent content for clues about the perpetrator, the victim, or even the location. But the program regularly leads to job offers from ICE, according to an agency spokesman.

The collaboration between ICE’s Homeland Security Investigations office, U.S. Special Operations Command, and the National Association to Protect Children builds the ranks of child sexual abuse investigators, as law enforcement across the United States scrambles to keep up with networks of elusive online suspects — the ones supplying the images and the ones demanding them.

Non-profit organizations like the National Center for Missing and Exploited Children that also work on these cases report that the trade in child pornography images is growing “exponentially.” They report receiving thousands of requests from law enforcement agencies to analyze millions of images and videos in one year.

Ragsdale, the second in command at ICE, says there aren’t enough analysts to meet the investigative demand. The agency is only one of several federal bureaus trying to dismantle the online exchange of child pornography, and in the week before Friday’s graduation, it posted three updates on three such cases:

  • “Tucson man sentenced to 10 years in prison for possessing and distributing child pornography”
  • “Idaho man sentenced to 25 years on federal child pornography charges”
  • “Southwest Texas man sentenced to nearly 16 years in federal prison for distributing child pornography”

“It’s daunting to see case after case after case… when you see 100-year sentences or multiple life sentences,” Ragsdale told the graduates. “Unfortunately, it’s still not enough. It’s certainly not tipping the scale to dissuade people who abuse children.”

“You are joining a fight that law enforcement is having a hard time winning,” he added.

*

‘Horrible photos’

Chosen to speak for the class at the ceremony, Wooten’s voice faltered at the podium; he spoke about friends who died in combat or after returning home. He mentioned the veteran suicide rate in the U.S. — about 20 a day. He talked of “scars, visible and invisible.”

More than the adrenaline rush of military work under high stress, Wooten says with the investigatory work “you get that sense of pride back.”

“In the military, you’re very proud to serve your country. And this, you almost get a sense of pride that ‘I’m able to handle the images,’” said Wooten, who at 29, is the father of five children. “I knew the struggle was going to be looking at horrible photos and videos that everyday people don’t even know goes on.

“This job, I’m actually going out and saving kids and stopping bad guys, and help putting bad guys behind bars by analyzing evidence and different things that help them get a prison sentence,” said Wooten. “Before, I was just sitting at a desk basically doing paperwork.”

Dubai Police Arrest White House Hackers

Dubai Police Arrest Hackers Who Targeted White House Staff

Image result for ajman dubai map

Dubai police have arrested foreign hackers who targeted five senior White House officials in a blackmail email scam, state-owned media reported on Monday.

The Arabic-language Al Bayan newspaper and the television channel Dubai One reported the arrests, while Dubai police did not answer repeated calls for comment. The arrests come as the United Arab Emirates, which hosts some 4,000 U.S. troops fighting the Islamic State group, remains a crucial regional ally.

Al Bayan quoted Maj. Saud al-Khalidi of Dubai police as saying an “African gang” broke into the emails of the five senior officials and “got highly confidential information.” He said the U.S. asked Dubai police for assistance.

Al-Khalidi was quoted as saying that investigators tracked down the gang to an apartment in the emirate of Ajman and arrested three suspects. Those arrested are between 24 and 26 years of age and had a list of “5 million bank accounts,” as well as hacking software and millions of dollars in assets, he said.

The major said the three people had entered the UAE on visitor visas a few years ago.

The reports did not identify the White House officials targeted. Al-Khalidi reportedly said those suspects would be handed over to the United States for possible criminal trials.

The U.S. Embassy in Abu Dhabi did not respond to requests for comment. *** “Police reportedly faced resistance from the hackers but they were effectively subdued and arrested,” Dubai One reported in its nightly newscast. “Police say this was not their first operation, although it was their first offense here in the UAE. The hackers allegedly made it a business to sell information they managed to extract, moving from one country to another after every cyberattack.” The details mirrored those of a July 2015 Ajman raid previously announced by the UAE’s Interior Ministry in which three Nigerians were arrested. However, in that raid, officials only said they had “received information from the security authorities in the U.S. state of California,” never mentioning any connection to the White House.

The reports Monday did not identify the White House officials targeted. Al-Khalidi reportedly said those suspects would be handed over to the United States for possible criminal trials.

Meanwhile, last month, the Trump sons were in Dubai closing a business deal.

DUBAI, United Arab Emirates — Two of U.S. President Donald Trump’s sons ceremonially opened a Trump-branded golf club in Dubai today, meeting privately with Emirati elites as questions remain about how separated their father is from the empire bearing his name.

Eric and Donald Trump Jr., who now lead the Trump Organization, watched as fireworks lit the sky over the Trump International Golf Club in Dubai, on the outskirts of the city-state home to the world’s tallest building and other architectural marvels.

Image result for trump sons in dubai

The course’s opening comes after Donald Trump tried for years to enter the Arab market as a real estate mogul who later earned millions licensing his name to projects. The course’s opening now, as well as long-standing plans to open a second Trump-branded course in Dubai, could raise security and ethical issues for America’s 45th president going forward.

Though bars at the club eventually will serve alcohol, only soft drinks were dispensed at the windy gala today.

Billionaire Hussain Sajwani’s DAMAC Properties partnered with the Trump Organization to build the golf course at the heart of a development of villas and apartment blocks called DAMAC Hills. Among them are some 100 Trump-branded villas selling from 5 million dirhams ($1.3 million) to over 15 million dirhams ($4 million).

A string octet played classical music on the edge of the course designed by American golf architect Gil Hanse.

A pro shop inside the clubhouse sold Trump International Golf Club baseball caps for 150 dirhams ($40) and Trump-branded golf balls for ($5.50). Absent were the red “Make America Great Again” caps made famous by Trump’s campaign.

Both sons gave brief remarks at the opening, neither touching on their father’s new job. Donald Jr. instead applauded Dubai’s hereditary ruler, Sheikh Mohammed bin Rashid Al Maktoum.

“It’s truly awe inspiring,” he said. “In Dubai, if you can envision it, you can build it.”

Earlier today, Eric and Donald Jr. attended a private luncheon at Sajwani’s mansion on Dubai’s man-made Palm Jumeirah archipelago, speaking underneath an ornamental clock whose face spelled “SAJWANI VILLA.”

“It’s rare in the world where you can be such great friends with a partner and that’s what we have right here,” Eric Trump said. “Hussain, he is an amazing person and DAMAC is an amazing company.”

The two Trump brothers met with the over 80 people gathered at the event, attendee Niraj Masand told The Associated Press.

They were “expressing their gratitude to Mr. Sajwani, who is the chairman of DAMAC, and sort of expressing their happiness to meet with all the partners,” said Masand, a director of the real estate firm Banke International.

Ties between the Trumps and Sajwani remain strong. One of the Trump Organization’s subsidiaries received from $1 million to $5 million from DAMAC for running the golf club, according to a U.S. Federal Election Committee report submitted in May.

Sajwani and his family also attended a New Year’s Eve celebration at Trump’s Mar-a-Lago club in Florida, where Trump referred to them as “the most beautiful people from Dubai.”

Trump days later told journalists that DAMAC had offered the Trump Organization $2 billion in deals after his election, something DAMAC also confirmed.

“I must say, working with the Trump family and the Trump Organization was and continues to be a pleasure,” said Sajwani, who made some of his fortune supplying U.S. forces during the 1991 Gulf War that expelled Iraqi forces from Kuwait. Over the past decade, his companies have been awarded at least $1 million in contracting work, according to U.S. government records reviewed by the AP.

The Trump Organization has said it won’t make new foreign deals while its namesake is president. A previously planned Trump-branded golf course designed by Tiger Woods is still being built by DAMAC further down the road.

However, Kuwait and Bahrain both have scheduled events at a Trump-branded hotel in Washington. Experts also have raised concerns that existing Trump business abroad could run afoul of the so-called “emoluments clause” of the U.S. constitution.

That clause bars public officials from accepting gifts or payments from foreign governments and companies controlled by them without the consent of Congress. Already, a liberal-funded watchdog group has filed a lawsuit citing the clause.

Trump’s sons attended the Dubai events as private businessmen, but still traveled with a Secret Service detail as they are immediate family to the president. Guests went through a metal detector and had their bags X-rayed before attending the gala, though Dubai police kept a low profile.

Experts already have warned the Trump brand abroad now faces a global terror risk . However, the United Arab Emirates, a staunch U.S. ally in the war against the Islamic State group and host to some 5,000 American military personnel, remains a peaceful corner of the Middle East.

Gulf Arab leaders largely have been positive so far about Trump, hoping to see a harder line from America on Iran following the nuclear deal with world powers negotiated in part by the Obama administration.

The UAE’s foreign minister even backed Trump’s travel ban on seven Muslim-majority nations earlier this month, which didn’t include the UAE or neighboring Saudi Arabia.

The Dubai golf course marks Trump’s first successful venture in the Arab world. But it has raised questions about how the Trump Organization’s many international business interests will affect Trump’s administration.

Meanwhile, trips abroad by Trump’s two sons are expected to continue. Before Trump’s inauguration, his son Eric visited the Trump Tower Punta del Este in Uruguay to check on the tower’s progress and personally greet buyers. A Trump hotel in Vancouver, British Columbia, is also expected to soon host Trump’s sons.