10:47 AM

DoD Report Details Illicit Content Probe

An Inspector General report reveals that Pentagon employees and contractors were investigated, and some prosecuted, as part of an Immigration and Customs Enforcement probe into child pornography.

A Department of Defense investigation has identified a number of DoD workers and contractors who used government computers and networks to access child pornography.

The DoD Inspector General on July 23 released a 94-page report detailing the results of an investigation that dates back several years. Some of the cases were prosecuted, while others were dropped due to lack of evidence. The Boston Globe first reported details of the investigation.

The report describes the activities of several dozen federal workers and contractors, many of whom are not identified, that range from purchasing subscriptions to child porn Web sites to downloading images on workplace computers.

Many of the cases described in the report are the result of an Immigration and Customs Enforcement investigation called Operation Flicker, which identified some 5,000 people who allegedly subscribed to child porn Web sites operated overseas, according to the Inspector General report. Operation Flicker was launched in 2006, and many of the examples detailed in the report occurred in 2007 and 2008.

Both employees of and contractors for various defense agencies, including the National Security Agency, the National Reconnaissance Office, and the Defense Advanced Research Projects Agency, were investigated in the probe.

In one case, a DoD contractor admitted to subscribing to child porn sites, according to the report.

In another case, Christopher Stokes, an employee of National Defense University, was charged with purchasing child porn online and having pornographic material on his computer. In U.S. District Court, Stokes pleaded guilty to possessing child pornography and was sentenced in October 2008 to 60 months in prison and $12,500 in fines.

Also, contractor Dyncorp came across suspicious images when running McAfee's anti-virus software on Pentagon computers. A subsequent investigation uncovered 75 images of child pornography and evidence that the Pentagon worker involved had visited child porn sites, according to the report.

The IG report is heavily redacted, with names of some individuals, their organizational affiliations, and other information blocked out. But details emerge on how transactions for the illegal content were conducted. According to the report, several individuals used their .mil e-mail addresses, while others used PayPal accounts to pay for access to restricted sites.

The investigation included forensic reviews of PCs, laptops, home computers, and, in at least one case, a USB storage device. In some cases, thumbnail images on computers indicated that images were viewed but not downloaded. Also, some evidence was deemed not to constitute child pornography.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
The Top Cybersecurity Risks And How Enterprises Are Responding
The Top Cybersecurity Risks And How Enterprises Are Responding
The information security landscape is a constantly shifting risk environment. Today's IT security department must manage both internal and external threats' ranging from malware to mobile device vulnerabilities, to cloud security and ransomware. Download the Dark Reading 2016 Strategic Security Survey to gain insight into how security professionals view these risks, and how they are addressing them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
According to industry estimates, about a million new IT security jobs will be created in the next two years but there aren't enough skilled professionals to fill them. On top of that, there isn't necessarily a clear path to a career in security. Dark Reading Executive Editor Kelly Jackson Higgins hosts guests Carson Sweet, co-founder and CTO of CloudPassage, which published a shocking study of the security gap in top US undergrad computer science programs, and Rodney Petersen, head of NIST's new National Initiative for Cybersecurity Education.