Conspired to Secretly Bring to the US More Than $18 Million in Untaxed Money Held in Foreign Banks
A Houston, Texas, attorney was sentenced to 24 months in prison for conspiring to defraud the United States and tax evasion, announced Principal Deputy Assistant Attorney General Richard E. Zuckerman of the Justice Department’s Tax Division and U.S. Attorney Ryan K. Patrick for the Southern District of Texas.
In September 2019, a jury convicted Jack Stephen Pursley, also known as Steve Pursley, of conspiring with a client to repatriate more than $18 million in untaxed income that the client had earned through his company, Southeastern Shipping. According to the evidence presented at trial, Pursley knew that the client had never paid taxes on these funds so Pursley designed and implemented a scheme to transfer the untaxed funds from Southeastern Shipping’s business bank account, located in the Isle of Man, to the United States. Pursley helped to conceal the movement of funds from the Internal Revenue Service (IRS) by disguising the transfers as stock purchases in United States corporations owned and controlled by Pursley and his client.
Pursley received more than $4.8 million and a 25% ownership interest in the co-conspirator’s ongoing business for his role in the fraudulent scheme. In 2009 and 2010, Pursley evaded the assessment of and failed to pay the taxes he owed on these payments by, among other means, withdrawing the funds as purported non-taxable loans and returns of capital. Pursley used the money he garnered from the fraudulent scheme for personal investments, and to purchase personal assets, including a vacation home in Vail, Colorado, and property in Houston, Texas.
In addition to the term of imprisonment, U.S. District Judge Lynn N. Hughes ordered Pursley to serve 2 years of supervised release and to pay approximately $1,788,753 in restitution to the United States.
Principal Deputy Assistant Attorney General Zuckerman and U.S. Attorney Patrick commended special agents of IRS-Criminal Investigation, who conducted the investigation, and Trial Attorneys Sean Beaty, Grace Albinson, and Jack Morgan of the Tax Division, who prosecuted the case.
Additional information about the Tax Division and its enforcement efforts may be found on the Division’s website.
- Spectrum Management: Agencies Should Strengthen Collaborative Mechanisms and Processes to Address Potential InterferenceBy Sam NewsJuly 20, 2021What GAO Found The Federal Communications Commission (FCC) and National Telecommunications and Information Administration (NTIA) regulate and manage spectrum, and other agencies, such as the National Oceanic and Atmospheric Administration (NOAA) and National Aeronautics and Space Administration (NASA) are among federal spectrum users. To address potential interference among proposed uses of spectrum, these agencies employ various coordination mechanisms. For domestic matters, the agencies coordinate through an NTIA-led committee that provides input to FCC's spectrum proceedings. For U.S. participation in the International Telecommunication Union's (ITU) World Radiocommunication Conferences (WRC), agencies coordinate via a preparatory committee that provides input used to develop U.S. positions that the Department of State submits to a regional body or directly to the WRC (see figure). Technical Coordination Process for U.S. Participation in WRC These mechanisms reflect some key collaboration practices but do not fully reflect others. For example, while the documents that guide coordination between FCC and NTIA and the preparatory committee emphasize reaching consensus whenever possible, there are no clearly defined and agreed-upon processes for resolving matters when agencies cannot do so. Additionally, neither document has been updated in almost 20 years, though agency officials said conditions regarding spectrum management activities have changed in that time. GAO's review of U.S. participation in ITU's 2019 WRC shows that these issues affected collaboration. For example, disputes among the agencies and the inability to reach agreement on U.S. technical contributions challenged the U.S.'s ability to present an agreed-upon basis for decisions or a unified position. NOAA and NASA conduct and FCC and NTIA review technical interference studies on a case-by-case basis. When originating from ITU activities, the agencies conduct or review technical interference studies through participation in international technical meetings and the preparatory committee process. However, the lack of consensus on study design and, within the U.S. process, specific procedures to guide the design of these types of studies, hampered U.S. efforts to prepare for the 2019 WRC. For example, the U.S. did not submit its studies on certain key issues to the final technical meeting, resulting in some stakeholders questioning whether the corresponding U.S. positions were technically rooted. Agreed-upon procedures could help guide U.S. efforts to design these studies and consider tradeoffs between what is desirable versus practical, to mitigate the possibility of protracted disagreements in the future. Why GAO Did This Study Spectrum is a scarce resource that supports vital services, such as mobile communications and Earth-observing satellites. In the U.S., FCC and NTIA regulate and manage nonfederal and federal spectrum use, respectively, while the ITU sets global regulations and hosts conferences to update them. Recent U.S. and ITU activities have sought to designate spectrum for possible 5G use and to study how to do so without causing harmful interference to other uses, particularly satellites like those operated by NOAA and NASA that contribute to weather forecasting and climate science. GAO was asked to review how agencies coordinate on and study these matters. Among other objectives, this report examines: (1) the extent that cognizant federal agencies follow leading practices in collaborating on potential interference effects on weather forecasting and (2) their processes to conduct and review technical interference studies. GAO reviewed documentation and interviewed officials from FCC, NTIA, NOAA, and NASA; analyzed how various agency mechanisms and processes were implemented during recent FCC and ITU spectrum-management activities; and compared agencies' efforts to key collaboration practices and applicable key elements of a sound research process.[Read More…]
- Two Texas Men Plead Guilty in Odometer Fraud SchemeBy Sam NewsApril 28, 2021Two Texas men pleaded guilty today to for their roles in an odometer tampering scheme.[Read More…]
- Covid-19 In Nursing Homes: HHS Has Taken Steps in Response to Pandemic, but Several GAO Recommendations Have Not Been ImplementedBy Sam NewsMarch 17, 2021What GAO Found GAO's review of data from the Centers for Disease Control and Prevention (CDC) found that winter 2020 was marked by a significant surge in the number of COVID-19 cases and deaths in nursing homes. However, CDC data as of February 2021, show that both cases and deaths have declined by more than 80 percent since their peaks in December 2020. With the introduction of vaccines, observers are hopeful that nursing homes may be beginning to see a reprieve. Nevertheless, the emergence of more highly transmissible virus variants warrants the need for continued vigilance, according to public health officials. GAO's prior work has found that nursing homes have faced many difficult challenges battling COVID-19. While challenges related to staffing shortages have persisted through the pandemic, challenges related to obtaining Personal Protective Equipment (PPE) and conducting COVID-19 tests—although still notable—have generally shown signs of improvement since summer 2020. Further, with the decline in nursing homes cases, the Centers for Medicare and Medicaid Services (CMS) updated its guidance in March 2021 to expand resident visitation, an issue that has been an ongoing challenge during the pandemic. Some new challenges have also emerged as vaccinations began in nursing homes, such as reluctance among some staff to receive a COVID-19 vaccine. The Department of Health and Human Services (HHS), primarily through CMS and the CDC, has taken steps to address COVID-19 in nursing homes. However, HHS has not implemented several relevant GAO recommendations, including: HHS has not implemented GAO's recommendation related to the Nursing Home Commission report, which assessed the response to COVID-19 in nursing homes. CMS released the Nursing Home Commission's report and recommendations in September 2020. When the report was released, CMS broadly outlined the actions the agency had taken, but the agency did not provide a plan that would allow it to track its progress. GAO recommended in November 2020 that HHS develop an implementation plan. As of February 2021, this recommendation had not been implemented. HHS has not implemented GAO's recommendation to fill COVID-19 data voids. CMS required nursing homes to begin reporting the number of cases and deaths to the agency effective May 8, 2020. However, CMS made the reporting of the data prior to this date optional. GAO recommended in September 2020 that HHS develop a strategy to capture more complete COVID-19 data in nursing homes retroactively back to January 1, 2020. As of February 2021, this recommendation had not been implemented. Implementing GAO's recommendations could help address some of the challenges nursing homes continue to face and fill important gaps in the federal government's understanding of, and transparency around, data on COVID-19 in nursing homes. In addition to monitoring HHS's implementation of past recommendations, GAO has ongoing work related to COVID-19 outbreaks in nursing homes and CMS's oversight of infection control and emergency preparedness. Why GAO Did This Study The COVID-19 pandemic has had a disproportionate impact on the 1.4 million elderly or disabled residents in the nation's more than 15,000 Medicare- and Medicaid-certified nursing homes, who are often in frail health and living in close proximity to one another. HHS, primarily through CMS and CDC, has led the pandemic response in nursing homes. The CARES Act includes a provision for GAO to conduct monitoring and oversight of the federal government's efforts to prepare for, respond to, and recover from the COVID-19 pandemic. GAO has examined the government's response to COVID-19 in nursing homes through its CARES Act reporting (GAO-21-265, GAO-21-191, GAO-20-701, and GAO-20-625). This testimony will summarize the findings from these reports. Specifically, it describes COVID-19 trends in nursing homes and their experiences responding to the pandemic, and HHS's response to the pandemic in nursing homes. To conduct this previously reported work, GAO reviewed CDC data, agency guidance, and other relevant information on HHS's response to the COVID-19 pandemic. GAO interviewed agency officials and other knowledgeable stakeholders. In addition, GAO supplemented this information with updated data from CDC on COVID-19 cases and deaths reported by nursing homes as of February 2021. For more information, contact John E. Dicken at (202) 512-7114 or firstname.lastname@example.org.[Read More…]
- United States Announces New Humanitarian Assistance for Displaced Rohingya and Members of Other Affected Communities in Bangladesh and BurmaBy Sam NewsSeptember 27, 2020Morgan Ortagus, [Read More…]
- U.S. Special Envoy for Yemen Lenderking’s Travel to Saudi ArabiaBy Sam NewsJuly 27, 2021Office of the [Read More…]
- North Carolina Risk Consultant Pleads Guilty to Tax Fraud and Illegally Possessing a FirearmBy Sam NewsAugust 21, 2020A Chapel Hill, N.C., businessman pleaded guilty today to filing a false tax return and being a felon in possession of a firearm, announced Principal Deputy Assistant Attorney General Richard E. Zuckerman of the Justice Department’s Tax Division and U.S. Attorney Matthew G.T. Martin for the Middle District of North Carolina.[Read More…]
- Gender Pay Differences: The Pay Gap for Federal Workers Has Continued to Narrow, but Better Quality Data on Promotions Are NeededBy Sam NewsDecember 3, 2020The overall pay gap between men and women in the federal workforce has narrowed considerably, from 19 cents on the dollar in 1999 to 7 cents in 2017, but the current pay gap is greater for certain groups of women, according to GAO's analysis of data from the Office of Personnel Management (OPM). Two trends help explain why the pay gap has narrowed: (1) men and women have become more similar in measurable factors related to pay, such as occupation; and (2) women have earned slightly higher rates of pay increases than men. In 2017, most of the overall pay gap—or 6 of 7 cents on the dollar—was not explained by differences between men and women in measurable factors (see figure). This unexplained portion of the pay gap may be due to factors not captured in the data GAO analyzed, such as work experience outside the federal government, or factors that cannot be measured, such as discrimination and individual choices. In 2017, the overall and unexplained gaps were greater for certain groups. For example, compared to White men, the unexplained gap was greater for Hispanic/Latina, Black, and American Indian or Alaska Native women than for White and Asian, Native Hawaiian, or Pacific Islander women. Pay Gap between Men and Women in the Federal Workforce, 1999 to 2017 OPM and the U.S. Equal Employment Opportunity Commission (EEOC) have taken steps to analyze data on the pay gap and help agencies address it. From 2014 to 2016, OPM implemented a government-wide strategy to address the pay gap, and officials said their future efforts will include monitoring the pay gap periodically. EEOC annually collects workforce data from agencies and provides related technical assistance, and officials said they plan to expand these efforts. These data include promotions by gender and race and ethnicity, which EEOC and agencies use to identify potential barriers to career advancement, but GAO found these data were not sufficiently complete. Of the 51 data tables GAO requested, 35 were either missing or had at least one incomplete data element. EEOC officials said this is partly due to promotion applicants not being required to provide demographic information. However, EEOC has not fully assessed the reliability of these data and generally does not follow up with agencies about missing data between technical assistance visits. Without taking steps to assess and improve the quality of these data in a timelier manner, EEOC may miss opportunities to ensure equal opportunity for all promotion applicants. As the nation's largest employer, the federal government employed about 2.7 million workers in 2019. Although the pay gap between men and women in the federal workforce is smaller than it is for the entire U.S. workforce and has narrowed over time, studies show that pay disparities continue to exist. GAO was asked to explore the current status of pay equity in the federal workforce. This report examines how the pay gap between men and women in the federal workforce has changed since 1999, and what factors account for any remaining gap; and the extent to which OPM and EEOC have monitored and taken steps to address the pay gap in the federal workforce, including assessing potential disparities in promotions; among other objectives. GAO analyzed OPM's Enterprise Human Resources Integration data on about 2.1 million federal employees from September 1999 to September 2017 (the most recent reliable data available at the time of GAO's review); reviewed federal agency promotion data collected by EEOC for fiscal years 2015 through 2017 (the most recent available data); and interviewed OPM and EEOC officials and reviewed relevant documentation. GAO recommends that EEOC take steps to assess the quality of federal agency promotion data and address missing data with agencies in a timelier manner. EEOC neither agreed nor disagreed with GAO's recommendation. For more information, contact Cindy Brown Barnes at (202) 512-7215 or email@example.com.[Read More…]
- U.S. Rescues American Held Hostage in Nigeria By Sam NewsOctober 31, 2020
- Cybersecurity: Clarity of Leadership Urgently Needed to Fully Implement the National StrategyBy Sam NewsSeptember 22, 2020Federal entities have a variety of roles and responsibilities for supporting efforts to enhance the cybersecurity of the nation. Among other things, 23 federal entities have roles and responsibilities for developing policies, monitoring critical infrastructure protection efforts, sharing information to enhance cybersecurity across the nation, responding to cyber incidents, investigating cyberattacks, and conducting cybersecurity-related research. To fulfill their roles and responsibilities, federal entities identified activities undertaken in support of the nation's cybersecurity. For example, National Security Council (NSC) staff, on behalf of the President, and the National Institute of Standards and Technology, have developed policies, strategies, standards, and plans to guide cybersecurity efforts. The Department of Homeland Security has helped secure the nation's critical infrastructure through developing security policy and coordinating security initiatives, among other efforts. Other agencies have established initiatives to gather intelligence and share actual or possible cyberattack information. Multiple agencies have mechanisms in place to assist in responding to cyberattacks, and law enforcement components, including the Federal Bureau of Investigation, are responsible for investigating them. The White House's September 2018 National Cyber Strategy and the NSC's accompanying June 2019 Implementation Plan detail the executive branch's approach to managing the nation's cybersecurity. When evaluated together, these documents addressed several of the desirable characteristics of national strategies, but lacked certain key elements for addressing others. National Cyber Strategy and Implementation Plan are Missing Desirable Characteristics of a National Strategy Characteristic Cyber Strategy and Plan Coverage of Issue Purpose, scope, and methodology Addressed Organizational roles, responsibilities, and coordination Addressed Integration and implementation Addressed Problem definition and risk assessment Did not fully address Goals, subordinate objectives, activities, and performance measures Did not fully address Resources, investments, and risk management Did not fully address Source: GAO analysis of 2018 National Cyber Strategy and 2019 Implementation Plan . | GAO-20-629 For example, the Implementation Plan details 191 activities that federal entities are to undertake to execute the priority actions outlined in the National Cyber Strategy. These activities are assigned a level, or tier, based on the coordination efforts required to execute the activity and the extent to which NSC staff is expected to be involved. Thirty-five of these activities are designated as the highest level (tier 1), and are coordinated by a functional entity within the NSC . Ten entities are assigned to lead or co-lead these critical activities while also tasked to lead or co-lead lower tier activities. Leadership Roles for Federal Entities Assigned as Leads or Co-Leads for National Cyber Strategy Implementation Plan Activities Entity Tier 1 Activities Tier 2 Activities Tier 3 Activities National Security Council 15 7 3 Department of Homeland Security 14 19 15 Office of Management and Budget 7 6 5 Department of Commerce 5 9 35 Department of State 2 5 11 Department of Defense 1 6 17 Department of Justice 1 10 5 Department of Transportation 1 0 5 Executive Office of the President 1 0 0 General Services Administration 1 2 1 Source: GAO analysis of 2018 National Cyber Strategy and 2019 Implementation Plan . | GAO-20-629 Although the Implementation Plan defined the entities responsible for leading each of the activities; it did not include goals and timelines for 46 of the activities or identify the resources needed to execute 160 activities. Additionally, discussion of risk in the National Cyber Strategy and Implementation Plan was not based on an analysis of threats and vulnerabilities. Further, the documents did not specify a process for monitoring agency progress in executing Implementation Plan activities. Instead, NSC staff stated that they performed periodic check-ins with responsible entities, but did not provide an explanation or definition of specific level of NSC staff involvement for each of the three tier designations. Without a consistent approach to engaging with responsible entities and a comprehensive understanding of what is needed to implement all 191 activities, the NSC will face challenges in ensuring that the National Cyber Strategy is efficiently executed. GAO and others have reported on the urgency and necessity of clearly defining a central leadership role in order to coordinate the government's efforts to overcome the nation's cyber-related threats and challenges. The White House identified the NSC staff as responsible for coordinating the implementation of the National Cyber Strategy . However, in light of the elimination of the White House Cybersecurity Coordinator position in May 2018, it remains unclear which official ultimately maintains responsibility for not only coordinating execution of the Implementation Plan , but also holding federal agencies accountable once activities are implemented. NSC staff stated responsibility for duties previously attributed to the White House Cyber Coordinator were passed to the senior director of NSC's Cyber directorate; however, the staff did not provide a description of what those responsibilities include. NSC staff also stated that federal entities are ultimately responsible for determining the status of the activities that they lead or support and for communicating implementation status to relevant NSC staff. However, without a clear central leader to coordinate activities, as well as a process for monitoring performance of the Implementation Plan activities, the White House cannot ensure that entities are effectively executing their assigned activities intended to support the nation's cybersecurity strategy and ultimately overcome this urgent challenge. Increasingly sophisticated cyber threats have underscored the need to manage and bolster the cybersecurity of key government systems and the nation's cybersecurity. The risks to these systems are increasing as security threats evolve and become more sophisticated. GAO first designated information security as a government-wide high-risk area in 1997. This was expanded to include protecting cyber critical infrastructure in 2003 and protecting the privacy of personally identifiable information in 2015. In 2018, GAO noted that the need to establish a national cybersecurity strategy with effective oversight was a major challenge facing the federal government. GAO was requested to review efforts to protect the nation's cyber critical infrastructure. The objectives of this report were to (1) describe roles and responsibilities of federal entities tasked with supporting national cybersecurity, and (2) determine the extent to which the executive branch has developed a national strategy and a plan to manage its implementation. To do so, GAO identified 23 federal entities responsible for enhancing the nation's cybersecurity. Specifically, GAO selected 13 federal agencies based on their specialized or support functions regarding critical infrastructure security and resilience, and 10 additional entities based on analysis of its prior reviews of national cybersecurity, relevant executive policy, and national strategy documents. GAO also analyzed the National Cyber Strategy and Implementation Plan to determine if they aligned with the desirable characteristics of a national strategy. GAO is making one matter for congressional consideration, that Congress should consider legislation to designate a leadership position in the White House with the commensurate authority to implement and encourage action in support of the nation's cybersecurity. GAO is also making one recommendation to the National Security Council to work with relevant federal entities to update cybersecurity strategy documents to include goals, performance measures, and resource information, among other things. The National Security Council neither agreed nor disagreed with GAO's recommendation. For more information, contact Nick Marinos at (202) 512-9342 or firstname.lastname@example.org.[Read More…]
- Republic of Korea’s National DayBy Sam NewsAugust 13, 2021Antony J. Blinken, [Read More…]
- Special Envoy for the Horn of AfricaBy Sam NewsApril 23, 2021Antony J. Blinken, [Read More…]
- Secretary Blinken’s Call with Qatari Deputy Prime Minister and Minister of Foreign Affairs Al-ThaniBy Sam NewsAugust 20, 2021Office of the [Read More…]
- [Request for Reconsideration of Protest of NASA Contract Award]By Sam NewsAugust 17, 2021A firm requested reconsideration of a dismissed protest of a National Aeronautics and Space Administration (NASA) contract award for custodial, roads, and grounds maintenance services. GAO had held that the original protest was untimely. In its request for reconsideration, the protester contended that alleged NASA improprieties and procurement violations that took place during the initial protest warrant reconsideration of the protest. GAO held that the: (1) request for reconsideration was untimely; and (2) protester failed to show any legal errors or improprieties which would warrant reconsideration or reversal of the original decision. Accordingly, the original dismissal was affirmed.[Read More…]
- Protecting and Preserving a Free and Open South China SeaBy Sam NewsJanuary 14, 2021
- Assistant Attorney General John C. Demers Delivers Remarks on the National Security Cyber Investigation into North Korean OperativesBy Sam NewsFebruary 17, 2021Today, the Justice Department is announcing charges following a significant national security cyber investigation first disclosed publicly more than two years ago.[Read More…]
- Buckeye and West Shore Pipelines to Pay $8.7 Million in Civil Penalties and Damages for Injuries to Natural Resources Resulting from 2010 Crude Oil Spill near Lockport, IllinoisBy Sam NewsOctober 13, 2021The owner and operator of a pipeline have agreed to pay a $1.5 million civil penalty under the Clean Water Act and $7.2 million in damages and mitigation to resolve federal and state Oil Pollution Act and Clean Water Act claims arising from a 2010 spill of over 1,800 barrels of oil into a globally rare dolomite wetland from a pipeline near Lockport, Illinois. The complaint, filed along with the settlement, alleges that the crude oil spill injured a critical habitat for the federally-endangered Hine’s emerald dragonfly.[Read More…]
- Escort Sentenced to Prison for Underreporting IncomeBy Sam NewsMarch 5, 2021A Florida man was sentenced today to 21 months in prison for filing a false tax return. Jami Kopacz, of Fort Lauderdale, pleaded guilty to filing a false corporate tax return on Dec. 16, 2020. According to court documents and statements made in court, Kopacz worked as a paid escort for clients across the United States. Kopacz received payments directly from his escort clients, and from a private business for whom he worked as an independent contractor. From 2015 to 2018, Kopacz used his corporation, JK Training LLC, to receive income, and then filed false corporate tax returns (Forms 1120S) that substantially underreported the company’s gross receipts and total income.[Read More…]
- Las Vegas Couple Indicted for Tax Evasion SchemeBy Sam NewsAugust 3, 2021A federal grand jury in Las Vegas, Nevada, returned an indictment today charging a Las Vegas husband and wife with conspiring to defraud the IRS, tax evasion, filing a false tax return, assisting in the filing of false tax returns, and failing to file tax returns and pay federal income taxes.[Read More…]
- Secretary Michael R. Pompeo With Alex Marlow of Breitbart News Radio on SiriusXM PatriotBy Sam NewsDecember 14, 2020
- Serbia Travel AdvisoryBy Sam NewsIn TravelSeptember 26, 2020Reconsider travel to [Read More…]