What to do with a house I inherited in Texas?

If you inherited a house in Texas, and you have not decided yet whether to move in or sell the property. It is best considered to ask for a professional advice.

Seek for a real estate professional to maximize the value of your asset, and to consider selling the property, but if you decided to move in, it is also a best way to be advised to know more about the cost of living on the state.

First thing you need to do if you inherited a house; Look for a professional real estate agent to guide  you or assist you in marketing your property with the right price and under the best of terms.

Seeking for professional can help determine the needs of the property being sold. For example if the client is open for understanding the needs of renovation, the agent will assist and analyze for the best solution possible.

In addition, inherited houses needs to be market comparatively, this allows the buyer to analyze or estimate the properties’ value.

Look for a professional real estate agent to be an intermediary between sellers and buyers. Allow them to take responsibilities of the marketing and listing of potential buyers.

This will allow the seller/inheritor to have the opportunity and be guided with the right advise and proper assistance when comes with closing the deal.

The seller/inheritor can immediately process the marketing conditions, prices, mortgages, legal documents, insurance and other related matter in preparation of the negotiation process.

While preforming a comparative marketing strategy, the seller can be assured that property being sold is at state and has been managed in the auction.


Be consistent and committed with the decision being made, prepare the necessary legal documents like contracts, lease, deed of sales, closing statements, etc.

It would also be better to cooperate with appraisers, to know how much something is worth. It is an advantage to estimate the value of something being sold.

In addition, have an agreement with an Escrow Corporation or Organization, ideally to take over documents in the custody, and when a serious condition has been meet the property or the money can be easily released.

Get a connection with lender/ lenders; a mortgage officer is quite useful to maintain the stability of the monthly payment for the buyer. Consider having a connection with one can help ensuring the rent.

Develop a network that can have your back in terms of legal statements or cooperate with attorneys.

Having a licensed attorney that has practiced his/ her profession in the law of real estate can help you in various ways.

The Attorney will be working on the real estate matters like drafting lease, purchase agreement, and constructing an agreement.

It would also be easier to prepare things like the real estate property tax matters, and handling in zoning.

The attorney will also be capable of handling things in some non-real estate matter. Like for example of administering multiple real estate and/ or economic development transaction.

Prepare the renovation by hiring a specialist in design and space planning, make adjustments on the flooring, clean the area, polish the appliances and faucets, destroy living-pests hide out, and have a clean wash through disposition area. A a a

Repaint the color of the walls, make it look neutral and simple. This is a helpful way to attract potential buyers by simple having a short tour around.

As much as you like painting or redecorating the place, selecting of colors, and turning it into something much more of dramatic.

Repaint the bedrooms with neutral toned colors or a simple tan and white theme would be nice, have a nice set dramatic dining room with music or entertainment TV and clean kitchen place.

Get rid of the overly personal items like family pictures, kid’s artwork, or couple of trophy and medals or any acknowledgements, buyers do not want to see anything overly personal items.

Selection of the materials and accessories can also be helpful in setting up the old inherited house into well-organized ‘home sweet home’ for the buyer.

Get rid of bulky and other unused furniture, it is the necessity of getting rid of it since it does not fit with the new home style. Your old furniture should be sold or donated for the sake of the market and appearance as well, so get rid of any extra or oversized items that could make your space look smaller than it really is.

Kitchen a little outdated? Replace the little tweaks, because it can make a big difference in to selling the property. Replace the fixtures, faucets and hinges and even broken door knobs.

Give each room a purpose, the buyer do not want to see a room full of junk, so instead of putting unused things in a room, make it in to something much purposeful.

Pick a use of each room, like office room, guest room, fitness area, crafts room, and even play room/ ground for the kids.

Having a purpose on each room help buyers picture themselves relaxing with family, and guests. Turn the living room into much more conversational place.

Draw buyers’ eyes towards any special places or views in your place, the place you like the most. Bright colored rooms or accents like plants.

Bring nature inside, potted plants or a few nice smelling roses inside your rooms that can attract the buyer’s eye and encouraging the potential buyer to think of something purposeful in the room.

Fill empty corners or portions of the inherited house. It will definitely draw attention especially if the plants are in good health. Potted plants or a few of a pretty buds in a vase can help bring energy into a space.

So, if you have finished doing all those things being stated earlier. You are finish to close the deal or star negotiating the property you want to be sold. Run a promotion and be ready for the calls.






Lavrov blasts West’s ‘loudspeaker diplomacy’ after Austria claims it has exposed ‘Russian spy’

Lavrov blasts West’s ‘loudspeaker diplomacy’ after Austria claims it has exposed ‘Russian spy’

Sergey Lavrov lashed out at Western “loudspeaker diplomacy” after Austria said it exposed a retired military officer as a “Russian agent” who gathered data on the country’s army for years.

“I’ve learned about it right away … and, frankly speaking, I was unpleasantly surprised by the news,” Russian Foreign Minister said. At any rate, Vienna should have used other ways of delivering the espionage allegations, the top diplomat argued.

However, that is a strategy known to Moscow, as Western powers increasingly tend to use “loudspeaker diplomacy” to publicly blame Russia for “an issue that we know nothing of.”

Russia will now  summon the Austrian Ambassador to tell him “what methods should be used if they have any queries to Russia,” Lavrov concluded.

The case kicked off after Vienna confirmed that a retired Austrian colonel is accused of gathering information on his country’s military (the Bundesheer) since the 1990s. The senior officer, whose name has been withheld, allegedly began working for Russian intelligence in the 1990s, and this cooperation lasted until 2018.

Calling the alleged espionage “unacceptable,” Kurz said Vienna is now looking at all available options. “We will discuss further steps with our European partners,” he explained without elaborating.

Defense Minister Mario Kunasek told the media a tip-off came from a friendly intelligence agency, claiming the Russians provided the agent with spy gear, including encrypted radio communications.

The colonel was detained shortly after being flagged as a “Russian agent,” according to Michael Bauer, a military spokesman. The official said the agent, who has allegedly been transferring intelligence to Russia, was exposed due to “international cooperation. Following the news of the alleged spying, Foreign Minister Karin Kneissl cancelled her planned visit to Russia.

READ MORE: ‘75,000 Russian informants’: UK think tank report mocked after they conduct only 16 interviews

While having confirmed the man was detained on espionage charges, Austrian authorities did not elaborate on the evidence backing up the claims.

Meanwhile, Russia has been bombarded with blunt accusations of having its feet in foreign state’s affairs for quite a while now. On the latest occasion in October, the Netherlands expelled four Russians who allegedly tried to wiretap on Wi-Fi network of the Organization for the Prohibition of Chemical Weapons (OPCW) back in April.

Moscow refuted the accusations describing them as “spy mania.” It also fired back at the claims, saying no solid proof has been presented, while the blame game only gained pace

Casino Slot Machine; Cat Queen game


“Cat Queen: Game by “PlayTech”


Cat Queen Game ,by PlayTech started in 1999, Playtech is one of the most papular gambling software suppliers that focus on casino games (i.e. Slot Machine, Card Games, etc.) Its casino content is one of the best in the market, giving the customers and players a chance to enjoy games featuring the latest technologies while playing it online. Some prefer playing online so they wouldn’t travel to their local casino. It is playable on both online and mobile platforms and over 500 casino games to enjoy.

How to play ‘Cat Queen Game’

This is one of the most popular games that you can play for real, called ‘Cat Queen’ by ‘Playtech’. Basically, there are 40 line combinations. You can either increase the number of lines or raise the line bet amount. The game is easy and can be played automatically.

Game Modes:

By selecting, ‘Autoplay’, the player will mark on a number of spins, and after choosing, the game will automaticaly initiate the roulette and will end after the desired spin numbers. The player also has control over selecting ‘Turbo Mode’. Whilst turbo mode is enabled, The player has to spin the roulette manually and decide to review each round of the game.  Note that the ‘Wild” icon is a substitute for all other symbols except for “Scatter”

Game Mechanics:

Depending on the machine, paylines begin left to right or right to left and can sometimes even be diagonal. For starters, when you hit 3 or more Scatter Symbols you will trigger 15 Free Games. Players have to take into account that if you hit the same winning combination again you receive an additional 15 Free Games. This means that you could potentially have infinite Free Games on Cat Queen, by Playtech.

Cat Queen Symbols:

  • Anubis and Maahes
  • The Scarab and the Bird Hieroglyph
  • The Ankh and the Eye of Horus
  • The Pharaoh Symbol
  • Scatter
  • Wild

Cat Queen Payline:



Gambling in Casino; Slot Machines

download.jpgIn Casino, Gambling is one of the most exciting past time nowadays. Whether it’s betting on your favorite sports team, buying tickets for the lottery, or even playing a slot machine at your local casino. Who doesn’t like to earn extra cash without having to break a sweat!? But what is the one thing that keeps people motivated to keep pushing their luck despite hitting consecutive loses in the casino? How do people fantasize with their fortune?

Since the slot machine has been famous in the casino, many gamblers try to explain a strategic advice, The problem with slot rules is that when trying to explain them to someone new to casino games, the advice means nothing more than a sympathetic smile.

While the age-old game of slots has some basic rules that anyone can understand, each game has its out unique payout structure, bonuses, minimum bets, number of pay lines and return to player rates which we will get into their hype in playing moreover. In most instance, Gamblers in the Casino does not think of losing at all. They sense the venture and joy every game. Later that time, gamblers often raise their wager to take a leap of faith whilst the others are afraid of uncertainty.

There are many reasons why people gamble

  • Exciting Risks – People love to take risks, and quite obviously gambling has its own thrill. The sense of anticipation “will I win” or “will I end up empty” A natural high, an adrenaline rush that many want to keep seeking can be experienced in gambling
  • Escapism –  The gambling environment provides an escape from everyday life. we are surrounded by different people, different sounds and emotions, all of which stimulate and arouse our senses. Some people go to their local Casino to escape bursting an unwanted anger in life.
  • Glamour – media and advertising agencies understand the psychology of gambling and often portray a stylish, sexy, fashionable image of gambling which attracts many people. In this way, the gambler in the casino tends to socialize.
  • Social – Gambling is a part of the culture in many countries and is widely anticipated by the majority of the population. Some do gambling to support their favorite team, either in NFL, Basketball, Soccer and other sports team.





The CIA’s communications suffered a catastrophic compromise. It started in Iran.

Flares v tear gas: Students clash with police over education reform in Athens

In 2013, hundreds of CIA officers — many working nonstop for weeks — scrambled to contain a disaster of global proportions: a compromise of the agency’s internet-based covert communications system used to interact with its informants in dark corners around the world. Teams of CIA experts worked feverishly to take down and reconfigure the websites secretly used for these communications; others managed operations to quickly spirit assets to safety and oversaw other forms of triage.

“When this was going on, it was all that mattered,” said one former intelligence community official. The situation was “catastrophic,” said another former senior intelligence official.

From around 2009 to 2013, the U.S. intelligence community experienced crippling intelligence failures related to the secret internet-based communications system, a key means for remote messaging between CIA officers and their sources on the ground worldwide. The previously unreported global problem originated in Iran and spiderwebbed to other countries, and was left unrepaired — despite warnings about what was happening — until more than two dozen sources died in China in 2011 and 2012 as a result, according to 11 former intelligence and national security officials.

The disaster ensnared every corner of the national security bureaucracy — from multiple intelligence agencies, congressional intelligence committees and independent contractors to internal government watchdogs — forcing a slow-moving, complex government machine to grapple with the deadly dangers of emerging technologies.

In a world where dependence on advanced technology may be a necessary evil for modern espionage, particularly in hostile regions where American officials can’t operate freely, such technical failures are an ever present danger and will only become more acute with time.

“When these types of compromises happen, it’s so dark and bad,” said one former official. “They can burrow in. It never really ends.”

A former senior intelligence official with direct knowledge of the compromise said it had global implications for the CIA.  “You start thinking twice about people, from China to Russia to Iran to North Korea,” said the former official.  The CIA was worried about its network “totally unwinding worldwide.”

Yahoo News’ reporting on this global communications failure is based on conversations with eleven former U.S. intelligence and government officials directly familiar with the matter who requested anonymity to discuss sensitive operations. Multiple former intelligence officials said that the damage from the potential global compromise was serious — even catastrophic — and will persist for years.

More than just a question of a single failure, the fiasco illustrates a breakdown that was never properly addressed. The government’s inability to address the communication system’s insecurities until after sources were rolled up in China was disastrous. “We’re still dealing with the fallout,” said one former national security official. “Dozens of people around the world were killed because of this.”


One of the largest intelligence failures of the past decade started in Iran in 2009, when the Obama administration announced the discovery of a secret Iranian underground enrichment facility — part of Iran’s headlong drive for nuclear weapons. Angered about the breach, the Iranians went on a mole hunt, looking for foreign spies, said one former senior intelligence official.

The mole hunt wasn’t hard, in large part, because the communications system the CIA was using to communicate with agents was flawed. Former U.S. officials said the internet-based platform, which was first used in war zones in the Middle East, was not built to withstand the sophisticated counterintelligence efforts of a state actor like China or Iran. “It was never meant to be used long term for people to talk to sources,” said one former official. “The issue was that it was working well for too long, with too many people. But it was an elementary system.”

“Everyone was using it far beyond its intention,” said another former official.

The risks posed by the system appeared to have been overlooked in part because of it was easy to use, said the former intelligence officials. There is no foolproof way to communicate — especially with expediency and urgency — with sources in hostile environments like Iran and China, noted the former officials. But a sense of confidence in the system kept it in operation far longer than was safe or advisable, said former officials. The CIA’s directorate of science and technology, which is responsible for the secure communications system, “says, ‘our s***’s impregnable,’ but it’s obviously not,” said one former official.

By 2010, however, it appears that Iran had begun to identify CIA agents. And by 2011,  Iranian authorities dismantled a CIA spy network in that country, said seven former U.S. intelligence officials. (Indeed, in May 2011, Iranian intelligence officials announced publicly that they had broken up a ring of 30 CIA spies; U.S. officials later confirmed the breach to ABC News, which also reported on a potential compromise to the communications system.)

Iran executed some of the CIA informants and imprisoned others in an intelligence setback that one of the former officials described as “incredibly damaging.” The CIA successfully exfiltrated some of its Iranian sources, said former officials.

The Iranian compromise led to significantly fewer CIA agents being killed than in China, according to former officials. Still, the events there hampered the CIA’s capacity to collect intelligence in Iran at a critical time, just as Tehran was forging ahead with its nuclear program.

U.S. authorities believe Iran probably unwound the CIA’s asset network analytically — meaning they deduced what Washington knew about Tehran’s own operations, then identified Iranians who held that information, and eventually zeroed in on possible sources. This hunt for CIA sources eventually bore fruit — including the identification of the covert communications system.

A 2011 Iranian television broadcast that touted the government’s destruction of the CIA network said U.S. intelligence operatives had created websites for fake companies to recruit agents in Iran by promising them jobs, visas and education abroad. Iranians who initially thought they were responding to legitimate opportunities would end up meeting with CIA officers in places like Dubai or Istanbul for recruitment, according to the broadcast.

Though the Iranians didn’t say precisely how they infiltrated the network, two former U.S. intelligence officials said that the Iranians cultivated a double agent who led them to the secret CIA communications system. This online system allowed CIA officers and their sources to communicate remotely in difficult operational environments like China and Iran, where in-person meetings are often dangerous.

A lack of proper vetting of sources may have led to the CIA inadvertently running a double agent, said one former senior official — a consequence of the CIA’s pressing need at the time to develop highly placed agents inside the Islamic Republic. After this betrayal, Israeli intelligence tipped off the CIA that Iran had likely identified some of its assets, said the same former official.

The losses could have stopped there. But U.S. officials believe Iranian intelligence was then able to compromise the covert communications system. At the CIA, there was “shock and awe” about the simplicity of the technique the Iranians used to successfully compromise the system, said one former official.

In fact, the Iranians used Google to identify the website the CIA was were using to communicate with agents. Because Google is continuously scraping the internet for information about all the world’s websites, it can function as a tremendous investigative tool — even for counter-espionage purposes. And Google’s search functions allow users to employ advanced operators — like “AND,” “OR,” and other, much more sophisticated ones — that weed out and isolate websites and online data with extreme specificity.

According to the former intelligence official, once the Iranian double agent showed Iranian intelligence the website used to communicate with his or her CIA handlers, they began to scour the internet for websites with similar digital signifiers or components — eventually hitting on the right string of advanced search terms to locate other secret CIA websites. From there, Iranian intelligence tracked who was visiting these sites, and from where, and began to unravel the wider CIA network.

U.S. intelligence officials were well aware of Iran’s formidable cyber-espionage capabilities. But they were flabbergasted that Iran managed to extirpate an entire CIA spy network using a technique that one official described as rudimentary — something found in basic how-to books.

But the events in Iran were not self-contained; they coincided roughly with a similar debacle in China in 2011 and 2012, where authorities rounded up and executed around 30 agents working for the U.S. (the New York Times first reported the extirpation of the CIA’s China sources in May 2017). Some U.S. intelligence officials also believe that former Beijing-based CIA officer Jerry Lee, who was charged with spying on behalf of the Chinese government in May 2018, was partially responsible for the destruction of the CIA’s China-based source network. But Lee’s betrayal does not explain the extent of the damage, or the rapidity with which Chinese intelligence was able to identify destroy the network, said former officials.

U.S. officials believe that Chinese intelligence obtained physical access to the transitional, or temporary, secret communications system used by the CIA to correspond with new, unvetted sources — and broke through the firewall separating it from the main covert communications system, compromising the CIA’s entire asset network in that country, Foreign Policy reported earlier this year.

It’s not clear whether China and Iran cooperated, but the former officials said the communications systems used in both countries were similar. The two governments may have broken the system independently. But Iranian, Chinese and Russian officials were engaged in senior-level communications on cyber issues around this time, recalled one former senior intelligence official —interactions that were “very suspicious in hindsight.”

The CIA declined to comment. The Iranian Mission to the UN did not respond to requests for comment.

Some U.S. intel officials took the interactions as an indicator of enhanced open coordination among these countries, and even a nascent alliance against the U.S. and its Five Eyes intelligence partners, this person said. (U.S. officials also believe Chinese officials subsequently shared information about its penetration of the secret CIA system with their Russian counterparts.)

“Our adversaries dramatically upped their game” in their offensive hacking operations, including those geared toward cracking the U.S. covert communications platforms, during this period, said another former senior intelligence official. This almost certainly included information sharing between these countries on U.S. covert communications techniques, said multiple former officials — the makings of a real-life “axis of evil.”

There were discrete signs of potential cooperation. Around the time of the purges of CIA informants in Iran and China, senior counter-espionage officials from China’s Ministry of State Security visited their counterparts in Tehran, said four former U.S. officials.

Some officials believe the two countries engaged in a trade — perhaps with Iran providing China with the technical information needed to pinpoint signs of online activity on the communications system, in exchange for military hardware, speculated one former official. “That’s the spy service way,” said another former official.

With dawning horror, U.S. officials realized that once Iranian or Chinese intelligence officials were able to pinpoint CIA assets within their own borders, they were almost certainly capable of zeroing in on similar digital signatures in other countries, former officials said.

Former officials said the fallout from the compromises was likely global in scope — potentially endangering all CIA sources that used some version of this internet-based system worldwide.

“You establish these networks that are obviously critical to our ability to really understand what our adversaries are up to — there’s a pride in that — and when something that valuable starts to fall apart, the concern is, ‘Are we developing a house of cards?’” said one former senior official. “A lot of bells went off” during this time, said this person, because “whatever methods and procedures we were using were in jeopardy because of what the Chinese and Iranians had determined. You find that you’re blind.”

These multiple, overlapping failures of the communication system created systemic problems for the agency. “There was a cascade of effects that flowed outward” from the initial breaches, said another former intelligence official. “Part of the problem was trying to figure out the second and third order of effects.”

Repairing this breach had to be approached with extraordinary delicacy because attempted fixes can expose sources. Iran or China could then target and flip those CIA sources, or use information about them as bargaining chips with other intelligence services, former officials said. Around this time, Iranian intelligence officials also began aggressively pitching CIA officers to become double agents —meaning that they had somehow identified agency personnel, potentially through this wider compromise, said one former intel official.

One country where the impact appears to have been contained is Russia. CIA officials who focus on Russia knew about the China ordeal and quickly adjusted their communications with sources accordingly, some of the former officials said. Aspects of the CIA’s Russia operations have historically been walled off from the rest of the agency, which likely helped minimize the damage. But the issue was so acute in the Middle East that the CIA was forced to suspend its use of internet-based covert communications systems there several times.

The problems were exacerbated by increasingly aggressive Iranian cyber-espionage. The Iranians “were very good tactically,” one former official said, and were adept at “breaking into low-level communications in the field, such as between Iraqi forces and their American counterparts.”

Starting around 2013, Iranian cyber experts seemed to be tracking CIA agents outside their own borders, including in Yemen, where Iran eventually compromised the internet-based covert communications system there, said one of the former officials. During this time, emergency meetings had to be scheduled at the agency because the Iranians had “hacked into systems outright that had nothing to do with them,” said this person — that is, those beyond Iran itself.

“Iran was aggressively going out to hunt systems down,” the former official said. “They weren’t just protecting themselves anymore.”


As Iran was making fast inroads into the CIA’s covert communications system, back in Washington an internal complaint by a government contractor warning officials about precisely what was happening was winding its way through a Kafka-esque appeals system.

In 2008 — well before the Iranians had arrested any agents — a defense contractor named John Reidy, whose job it was to identify, contact and manage human sources for the CIA in Iran, had already sounded an alarm about a “massive intelligence failure” having to do with “communications” with sources. According to Reidy’s publicly available but heavily redacted whistleblower disclosure, by 2010 he said he was told that the “nightmare scenario” he had warned about regarding the secret communications platform had, in fact, occurred.

Reidy refused to discuss his case with Yahoo News. But two former government officials directly familiar with his disclosure and the investigation into the compromises in China and Iran tell Yahoo News that Reidy had identified the weaknesses — and early compromise — that eventually befell the entire the covert communications platform.

Reidy’s case was complicated. After he blew the whistle, he was moved off of his subcontract with SAIC, a Virginia company that works on government information technology products and support. According to the public disclosure, he contacted the CIA inspector general and congressional investigators about his employment status but was met with resistance, partially because whistleblower protections are complicated for federal contractors, and he remained employed.

Meanwhile, throughout 2010 and 2011, the compromise continued to spread, and Reidy provided details to investigators. But by November 2011, Reidy was fired because of what his superiors said were conflicts of interest, as Reidy maintained his own side business. Reidy believed the real reason was retaliation.

In his 2014 appeal to the intelligence community inspector general, first published by McClatchy News, Reidy describes the first signs of compromise in stunning detail — though it was unclear at the time, because of what was redacted, what issue he was addressing. “As our efforts increased, we started to notice anomalies in our operations … sources abruptly and without reason ceasing all communications with us,” he wrote.

Something, he realized, was deeply wrong with the agency’s human sources network. The “U.S. communications infrastructure was under siege,” he wrote. Reidy warned that the problem wasn’t limited to a single country — it extended to everywhere the CIA operates. Close to 70 percent of operations at the time were potentially compromised, he noted. In other words, an entire class of CIA agents — those using some iteration of the online system — was in danger. “CIA is aware of this,” he wrote. “The design and maintenance of the system is flawed.”

Reidy’s complaint wasn’t fully addressed for many years. But when the wide-scale arrest of sources in Iran happened, the CIA eventually launched an investigation. The deaths in China sent investigators into overdrive. Teams from the CIA, the FBI and the House Permanent Select Committee on Intelligence scrambled to try to figure out what had happened — and how to stem the damage.

“Can you imagine how different this whole story would’ve turned out if the CIA [inspector general] had acted on Reidy’s warnings instead of going after him?” said Kel McClanahan, Reidy’s attorney. “Can you imagine how different this whole story would’ve turned out if the congressional oversight committees had done oversight instead of taking CIA’s word that he was just a troublemaker?”

Irvin McCullough, a national security analyst with the Government Accountability Project, a nonprofit that works with whistleblowers, put the issue in even starker terms. “This is one of the most catastrophic intelligence failures since September 11th,” he said. “And the CIA punished the person who brought the problem to light.”

The roll-up of the CIA’s networks reignited debates within the U.S. intelligence community about the merits of high-tech versus low-tech methods of communicating with sources. Within some corners of the intelligence world, “there was widely held belief that technology was the solution to all communications problems,” according to one of the former officials. Proponents of older methods — such as chalk marks, burst communications, brush passes and one-time pads — were seen as “troglodytes,” said this official.

The failure of the communication system was discussed extensively in closed-door hearings at the House and Senate Intelligence committees, according to several former officials. “Some of the senators and congressman went nuts about this, and they should have,” one of them said.

A spokesperson for the Senate Intelligence Committee declined to comment. The House Intelligence Committee did not respond to requests for comments.

One of the central concerns among those familiar with the scope of the breakdown is the institutions responsible for it were never held accountable. Doing a comprehensive investigation isn’t easy, “but you have an absolute obligation to do that, because if you don’t, all you’re doing is rolling the dice with future lives,” said one former senior official.

Even several years after the breach, the concern within the intelligence community is accountability.

“When we continuously allow things like this to happen, and Congress doesn’t do anything, and the institutions don’t do anything, you’re going to have worse issues,” said another former official.

“People will say, ‘I went to the inspector general and it didn’t work; I went elsewhere and it didn’t work.’ People will see it as a game. It will lead to corruption, and it will lead to espionage. When people see that the system is corrupt, it affects everything.”

Zach Dorfman & Jenna McLaughlin