DataBreaches.net

DataBreaches.net

The Office of Inadequate Security

Menu
  • Breach Laws
  • About
  • Donate
  • Contact
  • Privacy
  • Transparency Reports
Menu

State Department Employee Sentenced for Illegally Accessing Confidential Passport Files

Posted on January 22, 2010 by Dissent

A State Department employee was sentenced yesterday to 12 months of probation for illegally accessing 70 confidential passport application files. The sentence was announced by Assistant Attorney General Lanny A. Breuer of the Criminal Division.

Susan Holloman, 58, of Washington, D.C., was also ordered by U.S. Magistrate Judge Alan Kay in the District of Columbia to perform 75 hours of community service. On Nov. 9, 2009, Holloman pleaded guilty to a one-count criminal information charging her with unauthorized computer access.

According to court documents, Holloman has worked full-time for the State Department since November 1980, as a file assistant within the Bureau of Consular Affairs. In pleading guilty, Holloman admitted that she had access to official State Department computer databases in the regular course of her employment, including the Passport Information Electronic Records System (PIERS), which contains all imaged passport applications dating back to 1994. The imaged passport applications on PIERS contain, among other things, a photograph of the passport applicant as well as certain personal information including the applicant’s full name, date and place of birth, current address, telephone numbers, parent information, spouse’s name and emergency contact information. These confidential files are protected by the Privacy Act of 1974, and access by State Department employees is strictly limited to official government duties.

In pleading guilty, Holloman admitted that between Feb. 13 and Dec. 5, 2007, she logged onto the PIERS database and repeatedly searched for and viewed the passport applications of 70 celebrities and their families, actors, professional athletes, musicians and other individuals identified in the press. Holloman admitted that she had no official government reason to access and view these passport applications, but that her sole purpose in accessing and viewing these passport applications was idle curiosity.

To date, nine current or former State Department employees or contractors, including Holloman, have pleaded guilty in this continuing investigation. On Sept. 22, 2008, Lawrence C. Yontz, a former Foreign Service Officer and intelligence analyst, pleaded guilty to unlawfully accessing nearly 200 confidential passport files. Yontz was sentenced on Dec. 19, 2008, to 12 months of probation and ordered to perform 50 hours of community service. On Jan. 14, 2009, Dwayne F. Cross, a former administrative assistant and contract specialist, pleaded guilty to unlawfully accessing more than 150 confidential passport files. Cross was sentenced on March 23, 2009, to 12 months of probation and ordered to perform 100 hours of community service. On Jan. 27, 2009, Gerald R. Lueders, a former Foreign Service Officer, watch officer and recruitment coordinator, pleaded guilty to unlawfully accessing more than 50 confidential passport files. Lueders was sentenced on July 8, 2009, to 12 months of probation and ordered to pay a $5,000 fine.

In addition, on July 10, 2009, William A. Celey, a file assistant, pleaded guilty to unlawfully accessing more than 75 confidential passport files. Celey was sentenced on Oct. 23, 2009, to 12 months of probation and ordered to perform 50 hours of community service. On Aug. 26, 2009, Karal Busch, a former citizens services specialist, pleaded guilty to unlawfully accessing more than 65 confidential passport files. Busch was sentenced on Dec. 15, 2009, to 24 months of probation and ordered to perform 25 hours of community service. On Aug. 17, 2009, Kevin M. Young, a contact representative, pleaded guilty to unlawfully accessing more than 125 confidential passport files. Young was sentenced on Dec. 9, 2009, to 12 months of probation and ordered to perform 100 hours of community service. On Oct. 28, 2009, Yvette M. Burrison, a passport specialist, pleaded guilty to unlawfully accessing nearly 100 confidential passport files. A sentencing date has not yet been scheduled for Burrison. On Dec. 11, 2009, Debra Sue Brown, a file assistant, pleaded guilty to unlawfully accessing more than 60 confidential passport files. Brown is scheduled to be sentenced on Mar. 23, 2010.

These cases are being prosecuted by Trial Attorney Armando O. Bonilla of the Criminal Division’s Public Integrity Section. The cases are being investigated by the State Department Office of Inspector General.

Source: Department of Justice

Related Posts:

  • State Department Employee Sentenced for Illegally…
  • Second Former State Department Employee Pleads…
  • Illinois Woman Pleads Guilty to Illegally Accessing…
  • Third US gov't worker pleads to passport snooping
  • Bits 'n Pieces

Post navigation

← Man Sentenced for Stealing Fed Chairman’s Identity (updated)
MO: Man pleads guilty to ID theft, card fraud →

Sponsored or Paid Posts

This site doesn’t accept sponsored posts and doesn’t respond to requests about them.

Have a News Tip?

Email:

Breaches[at]Protonmail.ch
Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Telegram: @DissentDoe

Browse by News Section

Latest Posts

  • AlphV claims they have started contacting some of Tipalti’s clients
  • Research: Privacy as Pretense: Empirically Mapping the Gap Between Legislative & Judicial Protections of Privacy
  • What it means — CitrixBleed ransomware group woes grow as over 60 credit unions, hospitals, financial services and more breached in US.
  • On September 2nd, the U.S. branch of Great Star Industrial Co. disbursed a ransom of 1 million dollars to a ransomware group
  • Former Public School Information Technology Manager Charged with Damaging School’s Computer Network
  • Sellafield nuclear site hacked by groups linked to Russia and China
  • Hackers steal IDF patient records from cyberattack on Israeli hospital (corrected)
  • AlphV claims an attack before even alerting the victim. How will that work out for them? (1)

Please Donate

If you can, please donate XMR to our Monero wallet because the entities whose breaches we expose are definitely not supporting our work and are generally trying to chill our speech!

Donate- Scan QR Code   Donate!

Social Media

Find me on Infosec.Exchange.

I am also on Telegram @DissentDoe.

RSS

Grab the RSS Feed

Copyright

© 2009 – 2023, DataBreaches.net and DataBreaches LLC. All rights reserved.

HIGH PRAISE, INDEED!

“You translate “Nerd” into understandable “English” — Victor Gevers of GDI Foundation, talking about DataBreaches.net

©2023 DataBreaches.net