DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

State Department Employee Sentenced for Illegally Accessing Confidential Passport Files

Posted on January 22, 2010 by Dissent

A State Department employee was sentenced yesterday to 12 months of probation for illegally accessing 70 confidential passport application files. The sentence was announced by Assistant Attorney General Lanny A. Breuer of the Criminal Division.

Susan Holloman, 58, of Washington, D.C., was also ordered by U.S. Magistrate Judge Alan Kay in the District of Columbia to perform 75 hours of community service. On Nov. 9, 2009, Holloman pleaded guilty to a one-count criminal information charging her with unauthorized computer access.

According to court documents, Holloman has worked full-time for the State Department since November 1980, as a file assistant within the Bureau of Consular Affairs. In pleading guilty, Holloman admitted that she had access to official State Department computer databases in the regular course of her employment, including the Passport Information Electronic Records System (PIERS), which contains all imaged passport applications dating back to 1994. The imaged passport applications on PIERS contain, among other things, a photograph of the passport applicant as well as certain personal information including the applicant’s full name, date and place of birth, current address, telephone numbers, parent information, spouse’s name and emergency contact information. These confidential files are protected by the Privacy Act of 1974, and access by State Department employees is strictly limited to official government duties.

In pleading guilty, Holloman admitted that between Feb. 13 and Dec. 5, 2007, she logged onto the PIERS database and repeatedly searched for and viewed the passport applications of 70 celebrities and their families, actors, professional athletes, musicians and other individuals identified in the press. Holloman admitted that she had no official government reason to access and view these passport applications, but that her sole purpose in accessing and viewing these passport applications was idle curiosity.

To date, nine current or former State Department employees or contractors, including Holloman, have pleaded guilty in this continuing investigation. On Sept. 22, 2008, Lawrence C. Yontz, a former Foreign Service Officer and intelligence analyst, pleaded guilty to unlawfully accessing nearly 200 confidential passport files. Yontz was sentenced on Dec. 19, 2008, to 12 months of probation and ordered to perform 50 hours of community service. On Jan. 14, 2009, Dwayne F. Cross, a former administrative assistant and contract specialist, pleaded guilty to unlawfully accessing more than 150 confidential passport files. Cross was sentenced on March 23, 2009, to 12 months of probation and ordered to perform 100 hours of community service. On Jan. 27, 2009, Gerald R. Lueders, a former Foreign Service Officer, watch officer and recruitment coordinator, pleaded guilty to unlawfully accessing more than 50 confidential passport files. Lueders was sentenced on July 8, 2009, to 12 months of probation and ordered to pay a $5,000 fine.

In addition, on July 10, 2009, William A. Celey, a file assistant, pleaded guilty to unlawfully accessing more than 75 confidential passport files. Celey was sentenced on Oct. 23, 2009, to 12 months of probation and ordered to perform 50 hours of community service. On Aug. 26, 2009, Karal Busch, a former citizens services specialist, pleaded guilty to unlawfully accessing more than 65 confidential passport files. Busch was sentenced on Dec. 15, 2009, to 24 months of probation and ordered to perform 25 hours of community service. On Aug. 17, 2009, Kevin M. Young, a contact representative, pleaded guilty to unlawfully accessing more than 125 confidential passport files. Young was sentenced on Dec. 9, 2009, to 12 months of probation and ordered to perform 100 hours of community service. On Oct. 28, 2009, Yvette M. Burrison, a passport specialist, pleaded guilty to unlawfully accessing nearly 100 confidential passport files. A sentencing date has not yet been scheduled for Burrison. On Dec. 11, 2009, Debra Sue Brown, a file assistant, pleaded guilty to unlawfully accessing more than 60 confidential passport files. Brown is scheduled to be sentenced on Mar. 23, 2010.

These cases are being prosecuted by Trial Attorney Armando O. Bonilla of the Criminal Division’s Public Integrity Section. The cases are being investigated by the State Department Office of Inspector General.

Source: Department of Justice


Related:

  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
  • Former General Manager for U.S. Defense Contractor Pleads Guilty to Selling Stolen Trade Secrets to Russian Broker
  • Alan Turing institute launches new mission to protect UK from cyber-attacks
  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • NY: Gloversville hit by ransomware attack, paid ransom
Category: Government SectorInsiderU.S.

Post navigation

← Man Sentenced for Stealing Fed Chairman’s Identity (updated)
MO: Man pleads guilty to ID theft, card fraud →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.