U.S. Government Riddled with Malware After Employee Visits Porn Sites

Federal Employee Disregards Technology Compliance, Leaving Network Exposed

After an audit of the U.S. Geological Survey department, a federal report was released confirming government networks had been compromised.  According to the report, a federal employee exposed U.S. government systems to malware after visiting multiple pornographic sites.  During the follow-up investigation, the malware exposure was tracked down to a single employee’s noncompliance to technology standards.  This unnamed employee visited pornographic websites approximately 9,000 times.  In addition, they saved the images to USBs and their cell phone.

According to The Washington Post, U.S. government employees are not allowed to visit pornographic websites, or connect unauthorized devices to federal networks.  The employee, who is no longer employed with the USGS department, directly violated those regulations.

Since the incident was discovered, the Office of Inspector General has encouraged U.S. government departments to implement a list of known rogue sites.  They would then d prevent employees from accessing any websites listed on this list, known as a blacklist.  Unfortunately, like any other blacklist methodology, it can be bypassed.   It only takes finding a malicious or ill-intended website that hasn’t been included on the list, for users to bypass this level of “protection”.

3,316 total views, 11 views today

(Visited 2,273 times, 1 visits today)

9 thoughts on “U.S. Government Riddled with Malware After Employee Visits Porn Sites

  1. Every large company tries to do it on the cheap and their IT staff are the last to be included in the budget. Yes, even now (as you see).

    Should the guy get busted? He has– he’s been fired and now it’s on his record. Jail? No.

    Reason? His EMPLOYER is at fault. Yes, that’s correct. If you don’t want people accessing “whatever”, then you make it impossible to do. Toss a few dollars to your tech dept., USGS. It’ll do wonders.

  2. I suppose this guy probably blamed the Russians and got a slap on the wrist. So taxpayers are paying his salary while he is spending his time getting his thrills, or whatever, on 9,000 porn sites. Did he not have a supervisor? … or is he, himself, the boss? This is unacceptable. Drain the swamp. I agree with Wayne. Some jail time is required here.

  3. I’m sure he blamed it on the Russians, then just got a slap on the wrist. Why is this person not punished. So the taxpayers are paying this guy to make believe he is working while he visited 9,000 porn sites? Totally not acceptable.

    • @Wayne McCormick:

      It’s probably a company policy. There is no law against visiting porn on the Internet. If that were the case, the fall off of internet traffic would be huge, lol. Restitution, could be requested, but his job loss for the stated reason will taint him for a long time.

    • @Wayne McCormick:

      Yes IMHO he should be charged & if the charges are proven the punishment should include significant jail time. This is akin to sabotage & treason.
      Let’s not forget the sloppy state of security that allowed this to happen. Saying that someone breached protocol is a somewhat pathetic response. Whoever is in charge of security should be promptly fired for negligence.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.