DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Former DHS Acting Inspector General Indicted for Stealing Database with Personnel Information

Posted on March 6, 2020 by Dissent

Mariam Baksh reports:

A federal grand jury indicted a former acting inspector general for the Department of Homeland Security and his former subordinate in connection with the theft of proprietary software and databases containing government employees’ personal information for the purpose of defrauding the U.S. government, according to a Justice Department announcement.

The Justice Department alleges the defendants—Charles K. Edwards, the former acting inspector general at DHS, and Murali Yamazula Venkata—were driven purely by profit.

Read more on NextGov.

 via Joe Cadillic


The press release from the U.S. Department of Justice:

A federal grand jury in the District of Columbia returned a 16-count indictment against a former Acting Inspector General for the U.S. Department of Homeland Security (DHS) and a former subordinate for their alleged theft of proprietary software and confidential databases from the U.S. government as part of a scheme to defraud the U.S. government.

Assistant Attorney General Brian A. Benczkowski of the Justice Department’s Criminal Division, U.S. Attorney Timothy J. Shea for the District of Columbia, DHS Inspector General Joseph V. Cuffari and Inspector General Tammy L. Whitcomb for the U.S. Postal Service (USPS) made the announcement.

The indictment charges Charles K. Edwards, 59, of Sandy Spring, Maryland, and Murali Yamazula Venkata, 54, of Aldie, Virginia, with conspiracy to commit theft of government property and to defraud the United States, theft of government property, wire fraud, and aggravated identity theft.  The indictment also charges Venkata with destruction of records.

According to the allegations in the indictment, from October 2014 to April 2017, Edwards, Venkata, and others executed a scheme to defraud the U.S. government by stealing confidential and proprietary software from DHS Office of Inspector General (OIG), along with sensitive government databases containing personal identifying information (PII) of DHS and USPS employees, so that Edwards’s company, Delta Business Solutions, could later sell an enhanced version of DHS-OIG’s software to the Office of Inspector General for the U.S. Department of Agriculture at a profit.  Although Edwards had left DHS-OIG in December 2013, he continued to leverage his relationship with Venkata and other DHS-OIG employees to steal the software and the sensitive government databases.

The indictment further alleges that, in addition to stealing DHS-OIG’s software and the sensitive government databases, Venkata and others also assisted Edwards by reconfiguring his laptop so that he could properly upload the stolen software and databases, provided troubleshooting support whenever Edwards required it, and helped him build a testing server at his residence with the stolen software and databases, which contained PII.  As further part of the alleged scheme, Edwards retained software developers in India for the purpose of developing his commercial alternative of DHS-OIG’s software.

The indictment is the result of an ongoing investigation by DHS-OIG and USPS-OIG and is being prosecuted by Trial Attorney Victor R. Salgado of the Criminal Division’s Public Integrity Section and Assistant U.S. Attorney David B. Kent of the U.S. Attorney’s Office for the District of Columbia.

An indictment is merely an allegation and all defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law. 

Category: Government SectorInsiderU.S.

Post navigation

← 266,000 Passwords Stolen in Trident Crypto Fund Data Breach
Singapore, Malaysia credit card details dumped online in massive data breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach
  • HHS Office for Civil Rights Settles HIPAA Cybersecurity Investigation with Vision Upright MRI
  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • RIBridges firewall worked. But forensic report says hundreds of alarms went unnoticed by Deloitte.
  • Chinese Hackers Hit Drone Sector in Supply Chain Attacks
  • Coinbase says hackers bribed staff to steal customer data and are demanding $20 million ransom
  • $28 million in Texas’ cybersecurity funding for schools left unspent
  • Cybersecurity incident at Central Point School District 6

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025
  • License Plate Reader Company Flock Is Building a Massive People Lookup Tool, Leak Shows
  • FTC dismisses privacy concerns in Google breakup

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.