Employee Watching Porn At Work Infected US Government Agency's Network
from the inside-[hand]job dept
Watching porn at work is a federal government tradition. Federal employees from agencies like the EPA, SEC, and FCC have been caught watching porn enough times, a Congressional rep actually thought a new law was needed to stop it. The bill was redundant. All federal agencies forbid the use of work computers to watch porn but that hasn't stopped these stories from surfacing with disturbing frequency.
At a certain point, porn-watching at work endangers a person's job. At other points before that, it endangers the employer itself. Zack Whittaker of TechCrunch dug up a Dept. of the Interior Inspector General's report [PDF] indicating a porn-watching employee inadvertently tried to the take the agency down from the inside.
A U.S. government network was infected with malware thanks to one employee’s “extensive history” of watching porn on his work computer, investigators have found.
The audit, carried out by the U.S. Department of the Interior’s inspector general, found that a U.S. Geological Survey (USGS) network at the EROS Center, a satellite imaging facility in South Dakota, was infected after an unnamed employee visited thousands of porn pages that contained malware, which downloaded to his laptop and “exploited the USGS’ network.” Investigators found that many of the porn images were “subsequently saved to an unauthorized USB device and personal Android cell phone,” which was connected to the employee’s government-issued computer.
The official version -- with redactions -- provides a few more details. Loooooots of porn-watching going on here:
We found that [redacted] knowingly used U.S. Government computer systems to access unauthorized internet web pages. We also found that those unauthorized pages hosted malware. The malware was downloaded to [redacted's] Government laptop, which then exploited the USGS ' network. Our digital forensic examination revealed that- had an extensive history of visiting adult pornography websites. Many of the 9,000 web pages [redacted] visited routed through websites that originated in Russia and contained malware. Our analysis confirmed that many of the pornographic images were subsequently saved to an unauthorized USB device and personal Android cell phone connected to [redacted's] Government-issued computer. We found that [redacted's] personal cell phone was also infected with malware.
Like everywhere else this has happened, the DOI expressly forbids the use of work computers for porn viewing. It also makes employees sign a form stating that they understand what's forbidden and what can happen to them if they violate these policies. It's apparently not much of a deterrent. The report doesn't say what happened to [redacted] -- only that this employee admitted they were familiar with the policies they violated.
DOI also forbids connecting personal devices to work computers. That policy isn't being enforced either, apparently. If the DOI isn't actively monitoring work computers for these two violations, it really can't lay all the blame for the malware infection on its unofficial porn hub. Proactive measures are far more useful than post-infection policy patches.
Filed Under: department of the interior, government, malware, porn