Investigation: Department of Education employee infected government computer with virus by searching for child porn

Read the full story at DailyMail.com here.

A Department of Education employee left government computers vulnerable to hacking after downloading a virus while searching for ‘naked toddlers’, ‘little boys’, a and references to child rape, a report has revealed.

Documents obtained through a Freedom of Information Act request by DailyMail.com show the staffer typed in at least 18 illicit searches on his taxpayer-funded computer – included references to child porn.

The phrases he looked for in September, 2014, included: ‘Very young little girls’, ‘naked toddler’ and ‘too young boy’.

Other search terms allude to bestiality involving children and child rape.

As a result, his computer was infected with malware, putting massive databases at risk, including student loan information.

Once a computer is infected with the software, cyber criminals can access data by logging keystrokes or monitoring the computer’s activity.

Investigators then searched his government computer and found ‘graphic images of nude and nearly nude children as well as graphically drawn images of children engaging in sexual acts with adults’.

They then searched the employee’s home and found 13 images of child porn on his computer.

The employee, whose name has been kept hidden in the files, denied any wrongdoing and insisted he entered the search terms to test the system’s website-blocking protocols.

He was suspended during the investigations but then retired from government employee.

His identity remains under wraps because the case was not prosecuted.

The investigation was carried out by the Department of Education’s Inspector General, but reports are not often made public.

But DailyMail.com uncovered the record while looking through investigations into misconduct my staff members.

The document reads: ‘During the forensic examination of the computer, multiple anti -virus scans of the computer with different anti-virus products found potentially malicious files, but the creation date of those files significantly pre-dated the date on which the traffic that alerted the malware sensor occurred.’

‘In order to determine the cause of the malware detection, OCIO began a review of web history and browser artifacts on the subject computer. During this review, on December 3, 2014, OCIO recovered from the browser cache on the computer graphic photo images of nude and nearly nude children as well as graphically drawn images of children engaging in sexual acts with adults.

‘Upon discovering images that could be construed as child exploitation, OCIO immediately ceased the review of the computer and notified the Technology Crimes Division (TCD) of the Office of

‘Inspector General for the Department of Education (ED OIG). On December 3, 2014, TCD reviewed the material discovered by OCIO and determined it to be nearly identical to material from another investigation that resulted in prosecution for possession of child exploitation images. TCD took possession of the forensic image as well as the hard drive from the computer, which had been retained by OCIO personnel.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s