DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

State Department Employee Sentenced for Illegally Accessing Confidential Passport Files

Posted on January 22, 2010 by Dissent

A State Department employee was sentenced yesterday to 12 months of probation for illegally accessing 70 confidential passport application files. The sentence was announced by Assistant Attorney General Lanny A. Breuer of the Criminal Division.

Susan Holloman, 58, of Washington, D.C., was also ordered by U.S. Magistrate Judge Alan Kay in the District of Columbia to perform 75 hours of community service. On Nov. 9, 2009, Holloman pleaded guilty to a one-count criminal information charging her with unauthorized computer access.

According to court documents, Holloman has worked full-time for the State Department since November 1980, as a file assistant within the Bureau of Consular Affairs. In pleading guilty, Holloman admitted that she had access to official State Department computer databases in the regular course of her employment, including the Passport Information Electronic Records System (PIERS), which contains all imaged passport applications dating back to 1994. The imaged passport applications on PIERS contain, among other things, a photograph of the passport applicant as well as certain personal information including the applicant’s full name, date and place of birth, current address, telephone numbers, parent information, spouse’s name and emergency contact information. These confidential files are protected by the Privacy Act of 1974, and access by State Department employees is strictly limited to official government duties.

In pleading guilty, Holloman admitted that between Feb. 13 and Dec. 5, 2007, she logged onto the PIERS database and repeatedly searched for and viewed the passport applications of 70 celebrities and their families, actors, professional athletes, musicians and other individuals identified in the press. Holloman admitted that she had no official government reason to access and view these passport applications, but that her sole purpose in accessing and viewing these passport applications was idle curiosity.

To date, nine current or former State Department employees or contractors, including Holloman, have pleaded guilty in this continuing investigation. On Sept. 22, 2008, Lawrence C. Yontz, a former Foreign Service Officer and intelligence analyst, pleaded guilty to unlawfully accessing nearly 200 confidential passport files. Yontz was sentenced on Dec. 19, 2008, to 12 months of probation and ordered to perform 50 hours of community service. On Jan. 14, 2009, Dwayne F. Cross, a former administrative assistant and contract specialist, pleaded guilty to unlawfully accessing more than 150 confidential passport files. Cross was sentenced on March 23, 2009, to 12 months of probation and ordered to perform 100 hours of community service. On Jan. 27, 2009, Gerald R. Lueders, a former Foreign Service Officer, watch officer and recruitment coordinator, pleaded guilty to unlawfully accessing more than 50 confidential passport files. Lueders was sentenced on July 8, 2009, to 12 months of probation and ordered to pay a $5,000 fine.

In addition, on July 10, 2009, William A. Celey, a file assistant, pleaded guilty to unlawfully accessing more than 75 confidential passport files. Celey was sentenced on Oct. 23, 2009, to 12 months of probation and ordered to perform 50 hours of community service. On Aug. 26, 2009, Karal Busch, a former citizens services specialist, pleaded guilty to unlawfully accessing more than 65 confidential passport files. Busch was sentenced on Dec. 15, 2009, to 24 months of probation and ordered to perform 25 hours of community service. On Aug. 17, 2009, Kevin M. Young, a contact representative, pleaded guilty to unlawfully accessing more than 125 confidential passport files. Young was sentenced on Dec. 9, 2009, to 12 months of probation and ordered to perform 100 hours of community service. On Oct. 28, 2009, Yvette M. Burrison, a passport specialist, pleaded guilty to unlawfully accessing nearly 100 confidential passport files. A sentencing date has not yet been scheduled for Burrison. On Dec. 11, 2009, Debra Sue Brown, a file assistant, pleaded guilty to unlawfully accessing more than 60 confidential passport files. Brown is scheduled to be sentenced on Mar. 23, 2010.

These cases are being prosecuted by Trial Attorney Armando O. Bonilla of the Criminal Division’s Public Integrity Section. The cases are being investigated by the State Department Office of Inspector General.

Source: Department of Justice

Category: Government SectorInsiderU.S.

Post navigation

← Man Sentenced for Stealing Fed Chairman’s Identity (updated)
MO: Man pleads guilty to ID theft, card fraud →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach
  • ‘Deep concern’ for domestic abuse survivors as cybercriminals expected to publish confidential abuse survivors’ addresses
  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms
  • Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • Privilege Under Fire: Protecting Forensic Reports in the Wake of a Data Breach
  • Hacker who breached communications app used by Trump aide stole data from across US government
  • Massachusetts hacker to plead guilty to PowerSchool data breach (1)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.