DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

State Department Employee Sentenced for Illegally Accessing Confidential Passport Files

Posted on March 24, 2010 by Dissent

A State Department employee was sentenced today to 12 months of probation for illegally accessing more than 60 confidential passport application files, Assistant Attorney General Lanny A. Breuer of the Criminal Division announced. Debra Sue Brown, 47, of Oxon Hill, Md., was also ordered by U.S. Magistrate Judge John M. Facciola in the District of Columbia to perform 50 hours of community service. Brown pleaded guilty on Dec. 11, 2009, to a one-count criminal information charging her with unauthorized computer access.

According to court documents, Brown has worked full-time for the State Department since September 1995 as a file clerk and a file assistant in the Bureau of Consular Affairs. In pleading guilty, Brown admitted that she had access to official State Department computer databases in the regular course of her job, including the Passport Information Electronic Records System (PIERS), which contains all imaged passport applications dating back to 1994. The imaged passport applications on PIERS contain, among other things, a photograph of the passport applicant as well as certain personal information including the applicant’s full name, date and place of birth, current address, telephone numbers, parent information, spouse’s name and emergency contact information. These confidential files are protected by the Privacy Act of 1974, and access by State Department employees is strictly limited to official government duties.

Brown admitted that between March 25, 2005, and Feb. 7, 2008, she logged onto the PIERS database and repeatedly searched for and viewed the passport applications of more than 60 celebrities and their families, actors, comedians, professional athletes, musicians and other individuals identified in the press as well as personal friends and acquaintances. Brown admitted that she had no official government reason to access and view these passport applications, but that her sole purpose in accessing and viewing these passport applications was idle curiosity.

To date, nine current or former State Department employees or contractors , including Brown, have pleaded guilty in this continuing investigation. On Sept. 22, 2008, Lawrence C. Yontz, a former Foreign Service Officer and intelligence analyst, pleaded guilty to unlawfully accessing nearly 200 confidential passport files. Yontz was sentenced on Dec. 19, 2008, to 12 months of probation and ordered to perform 50 hours of community service. On Jan. 14, 2009, Dwayne F. Cross, a former administrative assistant and contract specialist, pleaded guilty to unlawfully accessing more than 150 confidential passport files. Cross was sentenced on March 23, 2009, to 12 months of probation and ordered to perform 100 hours of community service. On Jan. 27, 2009, Gerald R. Lueders, a former Foreign Service Officer, watch officer and recruitment coordinator, pleaded guilty to unlawfully accessing more than 50 confidential passport files. Lueders was sentenced on July 8, 2009, to 12 months of probation and ordered to pay a $5,000 fine. On July 10, 2009, William A. Celey, a file assistant, pleaded guilty to unlawfully accessing more than 75 confidential passport files. Celey was sentenced on Oct. 23, 2009, to 12 months of probation and ordered to perform 50 hours of community service.

On Aug. 17, 2009, Kevin M. Young, a contact representative, pleaded guilty to unlawfully accessing more than 125 confidential passport files. Young was sentenced on Dec. 9, 2009, to 12 months of probation and ordered to perform 100 hours of community service. On Aug. 26, 2009, Karal Busch, a former citizens services specialist, pleaded guilty to unlawfully accessing more than 65 confidential passport files. Busch was sentenced on Dec. 15, 2009, to 24 months of probation and ordered to perform 25 hours of community service. On Oct. 27, 2009, Yvette M. Burrison, a passport specialist, pleaded guilty to unlawfully accessing nearly 100 confidential passport files. Burrison is scheduled to be sentenced on April 7, 2010. On Nov. 9, 2009, Susan Holloman, a file assistant, pleaded guilty to unlawfully accessing 70 confidential passport files. Holloman was sentenced on Jan. 21, 2010, to 12 months of probation and ordered to perform 75 hours of community service.

These cases are being prosecuted by Trial Attorney Armando O. Bonilla of the Criminal Division’s Public Integrity Section. The cases are being investigated by the State Department Office of Inspector General.

Source: U.S. Dept. of Justice

Category: Government SectorInsiderU.S.Unauthorized Access

Post navigation

← Security Breach In Some Union First National Bank Accounts
An ACTA of insecurity →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Central Maine Healthcare tackles suspected cybersecurity issue; hospitals remain open
  • Cartier Data Breach: Luxury Retailer Warns Customers that Personal Data Was Exposed
  • Beyond the Pond Phish: Unraveling Lazarus Group’s Evolving Tactics
  • Akira doesn’t keep its promises to victims — SuspectFile
  • Fraudsters, murderers, students: who the GRU assembled a team of hacker provocateurs from and why it failed
  • Order of Psychologists of Lombardy fined 30,000 € for inadequate data security protection and detection following ransomware attack
  • Lower Merion School District says a data breach was caused by a computer glitch (1)
  • After $1 Million Ransom Demand, Virgin Islands Lottery Restores Operations Without Paying Hackers
  • Junior Defence Contractor Arrested For Leaking Indian Naval Secrets To Suspected Pakistani Spies
  • Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Stewart Baker vs. Orin Kerr on “The Digital Fourth Amendment”
  • Fears Grow Over ICE’s Reach Into Schools
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.