The DoD Inspector General on July 23 released a 94-page report detailing the results of an investigation that dates back several years. Some of the cases were prosecuted, while others were dropped due to lack of evidence. The Boston Globe first reported details of the investigation.
The report describes the activities of several dozen federal workers and contractors, many of whom are not identified, that range from purchasing subscriptions to child porn Web sites to downloading images on workplace computers.
Many of the cases described in the report are the result of an Immigration and Customs Enforcement investigation called Operation Flicker, which identified some 5,000 people who allegedly subscribed to child porn Web sites operated overseas, according to the Inspector General report. Operation Flicker was launched in 2006, and many of the examples detailed in the report occurred in 2007 and 2008.
Both employees of and contractors for various defense agencies, including the National Security Agency, the National Reconnaissance Office, and the Defense Advanced Research Projects Agency, were investigated in the probe.
In one case, a DoD contractor admitted to subscribing to child porn sites, according to the report.
In another case, Christopher Stokes, an employee of National Defense University, was charged with purchasing child porn online and having pornographic material on his computer. In U.S. District Court, Stokes pleaded guilty to possessing child pornography and was sentenced in October 2008 to 60 months in prison and $12,500 in fines.
Also, contractor Dyncorp came across suspicious images when running McAfee's anti-virus software on Pentagon computers. A subsequent investigation uncovered 75 images of child pornography and evidence that the Pentagon worker involved had visited child porn sites, according to the report.
The IG report is heavily redacted, with names of some individuals, their organizational affiliations, and other information blocked out. But details emerge on how transactions for the illegal content were conducted. According to the report, several individuals used their .mil e-mail addresses, while others used PayPal accounts to pay for access to restricted sites.
The investigation included forensic reviews of PCs, laptops, home computers, and, in at least one case, a USB storage device. In some cases, thumbnail images on computers indicated that images were viewed but not downloaded. Also, some evidence was deemed not to constitute child pornography.