Você está na página 1de 30
ase Number UNITED STATES GOVERNMENT FEDERAL COMMUNCIATIONS COMMISSION OFFICE OF INSPECTOR GENERAL MEMORANDUM Ses SUBJECT: J Overview On Febuary 11,2013, met with the computer activity” related to| ‘and reported “suspicious an FCC employee with the further explained that the is in the process of performing a “management inquiry” on based on other information that they have gathered, On February 12, 2013, the OIG. contacted BI and obtained additional information related to [provided copies of Internet Browser activity reports and registry FCC-issued computer. On February 13, 2013, the met with to discuss the allegations. During that meeting, alleged that does not report to work consistent with his tour of duty. {provided lysis of cardkey access records to support that allegation, {MMII} further alleged that the allegations. OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page 1 of 6 _REPORT OF INVESTIGATION (continuation sheet) uses his FCC-issued computer to view pornography and/or to access websites conlaining pornographic material. Based on that meeting, OIG initiated an investigation of = Specifically, OIG investigated allegations that committed Time and ‘Attendance (T&A) fraud and used his FC sued computer to view pornography. Our investigation did not substantiate the allegations. We did not find evidence that ‘committed time and attendance fraud or that he used his FCC-issued computer to vi pornography. Investigation To investigate this matter, OIG investigators performed the following steps: 1. Obtained forensic images of two (2) FCC-issued computers located in J office in CY-C247 of the FCC's Portals II facility located at 445 12" Street, S.W., Washington, pe. 2. Performed a forensic examination of the two (2) computers located in EE office to identify recent activity on those computers and to determine if the computers had been used to view pornographic material, 3. Obtained cardkey access record information (also known as “badge data”) for and| (a contractor to the FCC) and compared computer activity to cardkey activity to determine if cardkey access information accurately reported when _ was at work in his office in the Portals II building. 4. On March 7, 2013, OIG investigators interviewed JME. At the time of the ee was an employee with Answer Staffing Services who has a contract!_with the FCC to provide an tof to is a ment with the sees) receives accommogations as part of cn ag ic related to a ?_" dispute. One of the accommodations provided is an 5 aa 20 O16 esi ic A vs he }) for the Answer Stafting Services contract for a Six (6) year period ending in January 2013. ' Contract Number FCCI2GO163 ‘Case Number Case Title O1G-1-13-0014 OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page 2 of 6 REPORT OF INVESTIGATION (continuation sheet) 6. On March 28, 2013, OIG investigators interviewed is the current COR for the Answer Staffing Services contract eplaced as COR on the contract in January 2013. 7. On June 21,201. 1G investigators interviewed is the] it capacity, ind OnJuh 1.2013, OIG investigators interviewed] is the| Tn that capacity Findings ur investigation did not substantiate the allegations. Specifically, we did not find evidence that used his FCC-issued computer to view pomography or to access websites containing pomographic material. Further, we did not find evidence that| committed time and attendance fraud. Additional details regarding our findings are presented below. Use of FCC-issued Computer to View Pomography To investigate this allegation, the obtained forensic images of two (2) desktop computers that are physically located i ‘office. The Computer PRR 02008 compretensive toensic names of bth centers and did not identify any pomographic images or any Internet Browser artifacts indicating that used either computer to access websites containing pornographic material. During the investigation, O1G was informed that IIE uses his personal computer when he works from his home and that he may be using this computer to view pornography or access websites containing pornograpy. We did not examine this computer because we donot have the authority or the evidence necessary to obtain that authority Time and Attendance Fraud To investigate this allegation, OIG investigators examined cardkey access records (badge data). examined recent activity on two (2) FCC-issued computers in| s office, interviewed the BE 252028 10 suppor and FCC stan responsible for mana TReconTner ner wih that pport is povMenean intervie AA [Coe Nabe Case Title: [O1G-I-13-0014 ‘OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page 3 of 6 REPORT OF INVESTIGATION (continuation sheet) OIG investigators determined that the cardkey access records used as a basis for the allegation do not provide an accurate record of] time and attendance. We reached this conclusion for a number of reasons. First, Office is located outside of the perimeter of the icoess system and can be accessed without going through any card reader. According to would occasionally come into his office in the Portals II facility by going through the Portals I building located at 1280 wa Avenue, S.W.. Washington, DC. Accessing the facility in this way allows| to get to his office during business hours without going through a card reader.” Second, our examination of cardkey access records also showed a not generate a large number of cardkey access records on daye where cardkey ogeess records show aa vias in the ely (A does not move around the facility on days when he comes to the office). This increases the likelihood that, if] entered the facility through Portals I, no other cardkey access record would appear for that visit. Third, our examination of cardkey access records shows that oe not always use his cardkey to get through the card readers. For example, on -ebruary 12, 2013, entered the Portals II facility through the 12" Street entrance at 10:32:02 and exited the facility through the 12 Street eutrance at 13:21:06. No other cardkey information was generated, An examination of activity on the FCC-issued a his office shows activity between 10:32:02 and 13:21:06 supporting the conclusion that| R went through the card reader located at the Courtyard North entrance to the Portals Il faetlity without using his cardkey. Lastly, our comparison of computer activity associated with account with cardkey access records identified numerous instances of activity for account on the FCC-issued desktop computers in EEE office without comesponding inn access records. For example, we identified activity on the FCC-issued computers in office on the following dates without finding any corresponding cardkey access records for those dates: December 13, 2012, December 18, 2012 January 3, 2013 January 10, 2013 January 22, 2013, January 27, 2013, January 30, 2013 Dargie inestigaion O16 inet coined at Moc in te Foal sty cou be essed lrough the Portals I building without using a access Case Number: Case Title O1G-I-13-0014 OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page 4 of 6 REPORT OF INVESTIGATION (continuation sheet) © January 31, 2013 # Febmiary 5, 2013 * February 19, 2013 + February 20, 2013 ‘We recognize that there are a variety of possible explanations for computer activity on days whete ws donot find comegponding cardkey access records 1's possible te fs provided] or others with his login credentials and that the activity was generated by someone other than| It’s also possible that security guards in the Portals II facility sls IM 6 cone gh scat withing hs aeses cv nasoraneion siiven his physical condition. In any case and as previously stated, we consider the cardkey access records to be an unreliable tool to nest time and attendance. OIG investigators determined that (1) has a long history of time and attendance issues based on the interviews conducted with (2) his management team is aware of these issues; and (3) his| ‘was advised not to monitor activity. OIG investigators interviewe ‘When asked about] offered that ability f0 show up for work ‘Was “not very good about calling in” when he took a day off from work had several discussions a garding her expectations about coming to work and/or notifying her either by email or phone call when he needed to take a day off, but it did not seem to improve the notification process. There was no formal or written documentation of the discussions she had with JIM. nor was any official waming or disciplinary action given to regarding his not showing up for work. She did not check very often regarding when was in the office on those days he was to be at headquarters, es: work on long term projects and she did not have much interaction with fim, Smce he worked om long term projects, she did not find it necessary to check up on him or his status in/out of the office. When asked failed to respond during some ofthis period ii informed him ) time was better spent on other things” and that he shouldn't worry abou fe was no formal or written documentation of these instructions by the supervisor never received any official waming or disciplinary action regarding his attendance problems frou In addition, \dmitted that he did not frequently check w1 was in the office on those days OIG investigators interviewed about s reliability to show up for work, offered that Case Tile OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page 5 of 6 REPORT OF INVESTIGATION (continuation sheet) he was to be at headquarters. AC the conclusion of the meetin, provided a document that he had prepared that provides a timeline of issues related to ‘This tinueline shows that on December 28, 2003 and that in 2004 [I spoke fand was advised not to monitor because it would be too time consiming. The time also shows that Js successor advised [IJ that “he does not need to monitor} cause it would be too time-consummg,” Conclusion Our investigation did not substantiate the allegations. Specifically, we did not find evidence that used his FCC-issued computer to view pomography or to access websites containing pomographic material. Further, we did not find evidence that IMI committed time and attendance fraud Recommendations Although the investigation did not substantiate the allegations, we were nonetheless eoncemed with the pattem, aa behavior as it was described by his management team and by the history of management's apparent acceptance of this behavior. In our view, J is being allowed to operate in a manner thet is not compliant with Commission policies and procedures goveming time and attendance and is not compliant with the terms of his negotiated accommodation. Accordingly, we recommend that WIB management take steps to enforce compliance with Commission policies and procedures governing time and attendance and with the negtiated accommodation resardi ih Case Number Case Tite ol 13-0014 OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page 6 of 6 ‘UNITED STATES GOVERNMENT FEDERAL COMMUNCIATIONS COMMISSION OFFICE OF INSPECTOR GENERAL. MEMORANDUM PF EOMME Ze SoMa, DATE: March 4, 2013 FROM: Asa result of an| ‘sweep” of FCC computers, an FCC cont computer Was noted as havin, inappropriate material, including pomography as Well as unauthorized programs running on his machine. Subsequently the| team also conducted a remote imaging of aa computer using| The “sweep” results as well as a copy of the image results were tumed over to the Office of Inspector General, ions Group. OIG conducted a computer forensic examination and an interview with Our investigation confitmed the existence of pomography on iilcomputer, It also identified concerns with the lnck of guidelines regarding the installation of software and the provision of administrative rights on Commission computers. Case Niunber Case Tile 01G-113-0009 OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector Gener Page 1 of 4 REPORT OF INVESTIGATION (continuation sheet) indings ME is exnployed as a contractor to the FCC throw; Jand works as an He has ‘worked at the FCC for approximately years. admitted to having unauthorized DVD converter software, Firefox and iTunes as well as somte personal folders for some of his school material on his computer. explained that a number of years ago he had been given administeative user rights fo access a FCC financial system as part of his job. =a admitted ed this administrative authorization to download the Firefox aud iTunes program. further stated the DVD converter software was added in early January 2013, but that, Because he no longer had administrative rights and was thus unable to load the software, a friend of his, a federal employee working in the IT office who has administrative nights, downloaded the converter software at his request. —_ intended to remove the converter software after he finished copying a music DVD, but could provide no specific date as to when hie was going to remove the program. said he had iTunes on his computer to listen to inusie. He said that “other people have ITunes” and that he “didn’t think it was a problem (having iTunes) since it worked.” In addition, admitted to burning music CDs from his FCC computer, but he did not use Commission CDS in doing so. was then asked if he had any pomography on his computer and he responded “no, there definttely shouldn't be any of that.” aduitted having “model shots” that would inchide pictures of women in bikinis or ‘but he ) dil not think those pictures constituted pomography. [IM received these “model shots” from buddies that were on an email chain and such pictures were sent around on a periodic basis. When asked to explain ‘how investigators found pornography on his computer = admitted that there “might be” some pomography videos on his system. A “buddy” of his may have put some videos on his 's) iPod and . plugged his iPod into his computer it may have synced the videos. = indicated there may have been four such videos on his computer: was told that fhe number four did not correspond to the number of videos found during the forensic analysis of his computer. then said that the number may be closer to “10 or 15.” When it was explained to| that a total of 89 pomographie videos were found on his computer, IEEE responded that he had used 3 or 4 iPods over the last few years, so 89 videos aay be an accurate number stated he does not view the videos while at work nor share them with anyone at work and thinks they may have been synced to his computer ? or 3 years 35-0009 OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page 2 of 4 REPORT OF IN STIGATION (continuation sheet) 30. [BIBI stated he last accessed the videos and/or knew about the videos “when they were first synced up.” When confionted with the fact that the computer forensic examination showed that the video files were moved to his iTunes library on August 23, 2011 and October 7, 2011 admitted he realized they were on his system and he was trying to remove them in August and October, 2011. However the forensic examination also showed that I had NOT viewed the video's since he moved them in August and October 201 1. In an interview with EEE on February 13, 2013 he provided the following information here is no formal protocol involved in having non-standard fiware or hardware installed. Individuals may contact the help desk or directly and make a request to have something installed, had been through the cyber security training but has not received any additional guidance about which programs or hardware to install. The contractors had been through the same training but “they have been directed to not say no to any customer.” If he said no to an installation, but a user then Went to a contractor with the same request, the contractor shouldn't install the program. Contractors ate “told not to say no, but they're not idiots.” In addition, most of the requests he gets are from employees wanting to listen to music from their machine with which he does not have a problem, so he will help them out Without being asked, volunteered that he recently installed the DVD converter program on| ‘computer. He installed the DVD converter program on, computer to allow] to copy a music CD/DVD that was not playing properly claims he has not installed DVD converter software on any other FCC compnter Case Number Case Title: ] OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspeetor General Page 3 of 4 __REPORT OF INVESTIGATION (continuation sheet) a did not know why some people would say that iTunes wasn’t allowed on some computer while others said it was. “I think iTunes is part of the standard FCC computer image so it should be there.” He was asked if he’s getting requests for tax or legal software and he responded “we don’t have a need for that so we don't install i.” ey did not indicate there was a log to record what software was requested. Conclusion, Based on the computer forensic examination findings and the admissions by that he does have unauthorized programs on his FCC network computer as well as pomographic videos itis clear that [II has violated the FCC Cyber Security Pol -ecommendations Based our findings, we would recommend referring the case back to the| for disciplinary action as deemed appropriate and to the to adds the MMM sss elt a dis ORG een for evaluation for a possible future audit. When addressing the cyber security issues fill should consider determining what programs are acceptable and developing an approved list of software and hardware allowable on FCC network computers. Further the| should consider specific waining for oul employees who have decisional authority regarding the downloading of programs or addition of hardware FCC Cyber Security Program, Cyber Security Policy July 11, 2011 Case Number Case Title: O1G--13-0009 OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page 4 of 4 UNITED STATES GOVERNMENT FEDERAL COMMUNICATIONS COMMISSION OFFICE OF INSPECTOR GENERAL MEMORANDUM DATE: October 17,2013 TO: cc, FROM: SUBJECT: FCC Employee [IIININNNINN, Prohibited Use of Government Equipment and Time and Attendance Issues Background of Investigation On March 21, 2013, FCC OIG initiated a proactive investigation of child pomography on the FCC Network (FCC OIG Case # eT To conduct the investigation, FCC Investigators provided a comprehensive listing of child pornography keywords to contractors from the [i i SS GS GEES The contractors used the child pornography keywords to search for contraband on the network. On April 11, 2013, FCC Investigators were advised by contractor personnel assigned to the project that the keyword search had identified Internet Browser Favorites belioved to be associated with child pomography on a computer workstation (i i!) ossicned to J in = as aa | == browser favorites included "youngamateurs", "Young Porn", and "Topless 16." On April 12, 2013, during an examination of access control badge data, FCC Investigator EEE identified a pattern of access that appears to indicate OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page 1 of 9 Case Tite: en a REPORT OF INVESTIGATION (continuation sheet) indicate that [IE may be committing time and attendance fraud. Asa result of this information an investigation was opened covering the computer misuse/potential child pomography issue as well as time and attendance fraud. Scope of Investigation FCC OIG staff conducted interviews and reviewed and analyzed relevant material detailed below. Interviews © BB (4 cochment #5) + RB (cechinent #6) ° ER (A ttechment #7) Reports/Equipment Reviewed ‘+ Forensic examination o Analysis Report) sued computer (Attachment #1 Media Findings: Prohibited Use of Government Equipment (Desktop Computer) FCC Directive FCCINST 1479.4, FCC Cyber Security Program, effective May 1, 2011 Subparagraph 7.12 of FCCINST 1479.4 provides that users must: Read, sign indicating acceptance of, and comply with the FCC Computer System User Rules of Behavior, © Use ‘CC information system resources only for authorized FCC business purposes, except as provided by the FCC's limited personal use policy; ECC Cybersecurity Policy v3.1 Office of the Managing Director (OMD) Effective Date: July 31, 2012 Paragraph 2.0.2 Broad Organizational Policies of FCC Cybersecurity Policy provides: Staff using FCC information systems or accounts must not participate in unethical, illegal or inappropriate activities such as: for-profit commercial activities, pirating software, stealing passwords, stealing credit card numbers, and Case Number: O1G-113-0024 Case Title OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page 2 of 9 REPORT OF INVESTIGATION (continuation sheet) viewing/exchanging inappropriate written or graphic material (e.g., pornography), Paragraph 2.11 Internet Usage of FCC Cybersecurity Policy provides that unacceptable uses of the Internet when using an FCC intemet connection or account include: + You must not use the Intemet to view or download pornography. ECC Computer System User Rules of Behavior Form A-201 Revised January 2006 See Attachment #2 Rules of Behavior (ROB) signed by I 2/5/07; Computer System User Rules of Behavior provides: POLICY FOR USE OF COMPUTER RESOURCES. As an employee or contractor of the Federal Communications Commission (FCC), you are required to be aware of, and comply with the FCC’s policy on usage and security of computer resources, per OMB Circular A-130, Appendix III. Use of this system is for FCC authorized purposes only. Any other use may be misuse of Government property in violation of Federal regulations. All information in this system is subject to access by authorized FCC personnel at any time. Individual users have no privacy interest in such information. |, identified eleven (11) image files depicting pornographic material on} Js FCC-issued computer. Nine (9) of the eleven (11) images were of a young woman undressing another young woman. Because of the youn; age of the young women appearing in this series of images I 1 cess a series or Microsont tice documents that appear to be Craigslist posts including posts that describe sexual activity in ‘graphic terms and other documents that appear to be fantasy stories involving an individual named J” and describing sexual activity in graphic terms. — Fae] [ ‘Case Number: ‘Case Title: O1G-1-13-0028 ae] OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page3 of 9 REPORT OF INVESTIGATION (continuation sheet) investigator found documents that contain email exchanges between a person named J" and women with whom ‘ff appears to be discussing sex for money. Lastly, the| liscovered a large number of Internet “bookmarks” for websites that appear to conta pomography including several websites that may contain child pornography. ‘he MRI Find ny evidence ta sed the FCC network to access/obtain the pornographic material or to access Craigslist. Neither did the find evidence that was using the FCC network to distribute pomographic material. However, given the age of the material that was identified and given that the operating system on fs FCC issued computer has been upgraded since the material was obtained, it is possible that the FCC network was used to obtain the material and that the artifacts identifying that activity are no longer in the computer In an interview, [RE admitted using his FCC issued desktop for “other than official government work,” including accessing personal email, searching “music stuff,” and visiting adult sites. With regards to “adult sites,” [IM admitted to visiting the sites frequently “depending on what’s going on” and “how busy I'am.” In the last 2-3 months, he does not think he has visited any adult sites “because I’ve been busy.” Prior to this time, “when things were slow” [BB would visit adult sites “about 8 hours or more a week. offered that “people would say ‘have you seen this site”” and send him an email with a link to the site, “If it’s the site) is blocked I would not go any further.” He said he does not attempt to circumvent FCC intemet safeguards explained that here re box rrr inl ‘who are exchanging such links, but he would not provide their names. He is sent links about once a week also goes to sites that he researches or finds “interesting.” Some of the prohibited sites he visits are from “non-prohibited” websites like “the DMV of Virginia.” About 10 years ago, when| he saw an employee with adult videos and movies and asked how he did that, The employee said he “had someone help him set something up to get access to sites.” [IE cid not ask how or who could help him because “I thought it was wrong that he shouldn't be doing it” Also, BEB thought that the implication was that ag helped the employee set it up. He thought the individual might have been an iMMMat the time, but he knows itwasn’t a since| at that time. Again, IR would not provide the name of this person and would not confirm if this person was still employed at the FCC. [BB admitted to using his home computer to access adult sites about “an hour or two (hours) a week.” Because his wife and children also use the computer, he has set up his home computer to automatically delete cookies when he logs out. Case Number: Case Title: 1G-1-13-0024 OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page 4 of 9 REPORT OF INVESTIGATION (continuation sheet) acknowledged that there is @ banner when he logs onto his FCC issued computer that advised against “using the computer for personal stuf.” In addition, he said that he “knew it ‘was wrong” but continued to do it because “work was slow and I was interested in what other people and employees sent to me.” He would also search for sites using Internet Explorer. He stated does not use Google Chrome or Mozilla/Firefox.” [EEE was initially reluctant to acknowledge visiting the adult sites was wrong, but later in the interview agreed that it was against our (FCC) code of ethics and conduct, but that he was going to these sites out of boredom. With regards to the bookmarks on his computer, IIE “did not think he bookmarked anything” or “only a small amount.” He appeared shocked to leam of the number of sites that the forensic examine had uncovered. thought he had “deleted everything.” When eked why he found nese fos ad rowers ten i ste ne “anew it was wrong to go to these sites” and he was “concemed about things that were transmitted with these sites, like viruses. reiterated “I do not bookmark anything at least not on purpose.” When asked again said, “I might bookmark a couple things but I don’t think so.” stated that he “cannot think of any time” that he viewed pictures of children without clothes on, but has viewed pictures of children with clothes on. He asserted that the adult web sites he went to “had a waiver on the bottom, the one that says that the girls in the pictures are 18 and above.” [IMME did affirm that the “girls were young looking,” = reiterated he would click on links sent to him by other employees and said “I would guess there could be some under 18.” he had ever visited the adult section of Craigslist. Only at this time did admit to “probably” going to the adult section “about 4 or 5 years ago.” continued “I may have gone to the site about a year ago just because it’s there.” He said he never chatted or emailed ‘When first asked, [IY denied ever visiting Craigslist, When asked again, admitted going to Craigslist to “buy stuff, like a crib.” = spec ‘an aske if we identified a significant amount of Mozilla Firefox activity during the period from 2/8/2013 and 4/19/2013 and a small amount of Google Chrome activity between the period fom 2/1/2013 and 2/4/2013. 18 USC § 2257 - Record keeping requirements and 28 C..R. Pat 75 CHILD PROTECTION RESTORATION AND PENALTIES ENHANCEMENT ACT OF 1990; PROTECT ACT; ADAM WALSH CHILD PROTECTION AND SAFETY [ACT OF 2006; RECORDKEEPING AND RECORD-INSPECTION PROVISIONS ‘Case Number: Case Title: 01G-113-0024 gy OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page 5 of 9 REPORT OF INVESTIGATION (continuation sheet) anyone. In addition, |claimed he never met up with anyone from the site. specifically asked| [are you saying that you have never exchanged emails of a sexual nature with someone on Craigslist?” He responded, “it escapes my memory, but it sounds plausible.” [IRIE asserted that “it was a funny gesture, an experiment, but I never chatted with anyone.” He confirmed that he never used a chat program via Craigslist but “maybe I exchanged emails.” HERBIE ces not use any extemal media (thumb drive, extemal hard drive) to transfer documents or spreadsheets between his work computer and his home computer. At first, he said. that he only emailed documents to himself, but later admitted to burning spreadsheets to CDs and transporting those back and forth. Findings: Time and Attendance Issues SUSC § 6101 - Basic 40-hour workweek; work schedules: regulations (a) (1) For the purpose of this subsection, “employee” includes an employee of the government of the District of Columbia and an employee whose pay is fixed and adjusted from time to time under section 5343 or 5349 of this title, or by a wage board or similar administrative authority serving the same purpose, but does not include an employee or individual excluded from the definition of employee in section 5541 (2) of this title, except as specifically provided under this paragraph. (3) Except when the head of an Executive agency, a military department, or of the government of the District of Columbia determines that his organization would be seriously handicapped in carrying out its functions or that costs would be substantially increased, he shall provide, with respect to each employee in his organization, that— (A) assignments to tours of duty are scheduled in advance over periods of not less than 1 week; (B) the basic 40-hour workweek is scheduled on 5 days, Monday through Friday when possible, and the 2 days outside the basic workweek are consecutive; (C) the working hours in each day in the basic workweek are the same; (D) the basic nonovertime workday may not exceed 8 hours; (B) the occurrence of holidays may not affect the designation of the basic workweek; and (F) breaks in working hours of more than 1 hour may not be scheduled in a basic workday. Case Number: ‘Case Tile O1G-1-13-0024 OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page 6 of 9 REPORT OF INV. STIGATION (continuation sheet) 5S. USC Chapter 63, Subchapter I~ Annual and Sick Leave S.USC § 6302 - General provi (2) The days of leave provided by this subchapter are days on which an employee would otherwise work and receive pay and are exclusive of holidays and nonworkdays established by Federal statute, Executive order, or administrative order. According to the Federal Communications Commission’s Employee Handbook, page 16, “Tours of duty will be established by the supervisor to cover an eight and one-half hour period, including lunch, and will begin between 7:00 a.m. and 10:00 a.m. and end between 3:30 p.m. and 6:30 p.m.” HEREBY 2cimitted to teleworking but does not recall signing anything to formalize his telework arrangement. (Attachment #4 Telework Agreement SR He teleworks approximately one day a week and usually works on spreadsheets. 's tour of duty is from 8am until 4:30pm. However, he often shows up at 8:30 or 9:00am and “works through lunch” to make up the hours. said, BBB “rarely gets in at 8:00” and arrives “more likely at 10:00 or 10:30.” Access: Badge Data shows that typically arrives between 9:30 and 11am (usually around 10/10:30 am). said he will ask before taking leave or leaving early and then follow-up with puting hefewerequestsin WebT A, iS i i: TV 0 allowed him to leave early, work times other than his tour of duty, or do work after hours at home.” ‘Adkitionely sts that he only leaves early about 2 times or less a week. said he expects employees to work their full tour of duty stated he would “absolutely not” let an employee cut comers {0 leave early, work times other than his tour of duty or do work would “never ever do that.” When interviewed] (8 hours) each day. and never authorized] after hours at home. According _ have an “informal arrangement” that allows him to come in late and put in leave slips and/or work later to make up any time owed to the government. When interviewed, odie to not knowing when I actually arrives or departs but has a “gut feeling” and “suspects” that may not be taking the full amount of leave he should be taking for the time he is not actually at work. J commented “T've thought to myself, he’s putting in leave slips but is he putting in enough?” (Attachment Case Number: Case Tile ors. 1-13-0024 OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page 7 of 9 REPORT OF INVESTIGATION (continuation sheet) #3 Access control badge data analysis Spreadsheet MM approves III's leave in WebTA, but does not verify that is in the office during the hours he should be, was specifically asked why our review of his badge data versus his leave data would show 189 hour shortfall, (that he was out of the office for 189 hours for which leave was not approved) from Februai 1013 through August 12, 2013. He appeared shocked and did not think that was possible. stated that “I oftentimes work at home after hours and keep a mental report of the hours I work at home.” In addition, he said “if I'm working at home, I don’t charge it." could not explain what “I don’t charge it” means. He admitted that he may have some “delayed reporting,” but he usually catches up with leave requests the next day or by the end of the time period. When he works at home “in my mind I’m off-setting my leave.” He explained that, if he does work for a couple hours in the morning and then goes to the doctor, if he’s worked the hours, he won’t take leave. However, he keeps “a mind total” and “internal notes” of the extra hours he worked. He suggested that his calendar would have the notes about his hours but also offered “my calendar might not even be correct.” [IE insisted that he works at home to cover any hours that he hasn't worked in the building and keeps it all “mentally.” Conclusions: Prohibited Use of FCC Owned Computer Our investigation has established that [II engaged in personal, extensive non-work related use of his FCC-issued computer in violation of FCC Directive 1479.4 and the FCC Cybersecurity Policy. [I has admitted to visiting and viewing pomographic material and adult sites as well as possessing and writing inappropriate written graphic material. Conclusions: Time and Attendance Issues Based upon the access control system badge data and I's admission that he has arrived later and left earlier then his official tour of duty hours, 1tis Feasonable to conclude the has not followed the time and attendance rules relative to his official tour of duty. ‘Anal of Access Badge Data and payroll records show 152 hours for which [J was paid but was not in the building and was not on authorized leave.” NOTE: Human Resources Payroll office could not produce the Time and Attendance Records for Pay Period (PP) 02 (1/27/13 2/9/13) and PPO3 (2/10/13 - 2/23/13). Asa result, we have not included data from these pay periods in the overall calculation. Case Number Case Title O1G-1-13-0028 OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page 8 of 9 "REPORT OF INVESTIGATION (continuation sheet) Recommendations OIG is referring this matter to EEE for review and action as they deem appropriate. Attachments Attachment #1 Media Analysis Report, 8/7/13 (note: gray ages and language) Attachment #2 Rules of Behavior (ROB) signed "il 215107 Attachment #3 Access control badge data analysi et Attachment #4 Telework Agreement for Attachment #5 Memorandum of Interview: Attachment #6 Memorandum of Interview: Attachment #7 Memorandum of Interview: Case Number ‘Case Tile: O1G-1-13-0024 OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page 9 of 9 NON-PUBLIC FOR INTERNAL USE ONLY UNITED STATES GOVERNMENT FEDERAL COMMUNICATIONS COMMISSION OFFICE OF INSPECTOR GENERAL MEMORANDUM DATE: October 22, 2013 SUBJECT Attached hereto, and forwarded with my approval, is a memorandum coneludi the Office of Inspector General’ i wiry into the above-captioned matter. Attachment REPORT OF INVESTIGATION (continuation sheet) pomography on a computer workstation (FCC Barcode P020985) assigned to [a in the Consumer and Governmental Affairs Bureau (CGB), On September 12, 2013, during an examination of access control badge data which shows that a target is present when a computer is used, FCC — | identified a pattern of access that appears to indicate that [I may be committing time and attendance fraud. As a result of this information an investigation Was opened covering the potential child pornography issue as well as time and attendance fraud. Scope of Investigation FCC OIG staff conducted interviews and reviewed and analyzed relevant materials as detailed below. Interviews © BE (Attachment #4) - os Reports/Equipment Reviewed + Forensic examination of IMI FCC-issued computer (Attachment Media Analysis Report) oA sss Control Badge Data Analysis Spreadsheet (Attachment #3) Findings: Prohibited Use of Government Equipment (Desktop Computer) LFCC Directive FCCINST 1479.4, FCC Cyber Security Program, effective May 1, 2011 Subparagraph 7.12 of FCCINST 1479.4 provides that users must: ‘+ Read, sign indicating acceptance of, and comply with the FCC Computer System User Rules of Behavior; ‘* Use FCC information system resources only for authorized FCC business purposes, except as provided by the FCC's limited personal use policy 2. FCC Cybersecurity Policy v3.1 Office of the Managing Director (OMD) Case Number Case Tile O1G-1-13-0041 OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page 2 of 8 REPORT OF INVESTIGATION (continuation sheet) forensics investigator also found one (1) Adobe Acrobat document containing graphic descriptions of sexual activity and one (1) Microsoft Office document containing an inappropriate image. Further, the computer forensics investigator identified seven (7) video files depicting graphic violence. The computer forensics investigator determined that ‘used the FCC network to obtain some of the pornographic and inappropriate material. In an interview admitted to using his FCC issued desktop for “other than official government work.” offered that he may have music on his computer, as well as pictures of videogames, cars, shoes, women in bikinis as well as “naked women, but nothing under 18 or 21.” He admitted that he was getting these pictures from message boards or from Facebook pictures. These message boards also include topics related to sports and politics. He visits these message boards daily and thought he might have approximately 80 to 90 pomographic pictures. a] tro that during the computer forensic examination, 248 pomographic pictures and 22 pornographic videos were found. After additional —< | ultimately admitted to downloading pictures and knowing that he had pomographic videos on his Commission-issued computer. stated he is not passing pictures to FCC or other federal employees via his FCC,GOV email address, nor does he share articles he finds on the message boards via his FCC,GOV email address or visit adult web sites. =_—_ admitted to using his FCC computer to transfer pictures from his phone to a Zip or thumb drive, and saved pornographic pictures and videos to his CA drive on his computer. offered that during the forensic examination, 7 videos of violence were found. stated that he hasn’t viewed it in a long time, “maybe 3,4, 5 years ago.” He admitted to finding these photos on YouTube or WorldStar. He stated “I’m not searching for it” Findings: Suspected Marijuana Use Executive Order 12564 of September 15, 1986 Drug-Free Federal Workplace Section 1 provides that (a) Federal employees are required to refrain from the use of illegal drugs. (b) The use of illegal drugs by Federal employees, whether on duty or off duty, is contrary to the efficiency of the service. (©) Persons who use illegal drugs are not suitable for Federal employment. Case Number: Case Tile: O1G-113-0041 OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page 4 of 8 REPORT OF INVESTIGATION (continuation sheet) (A) assignments to tours of duty are scheduled in advance over periods of not less than 1 week; (B) the basic 40-hour workweek is scheduled on 5 days, Monday through Friday when possible, and the 2 days outside the basic workweek are consecutive; (©) the working hours in each day in the basic workweek are the same; (D) the basic nonovertime workday may not exceed 8 hours; (B) the occurrence of holidays may not affect the designation of the basic workweek; and (F) breaks in working hours of more than | hour may not be scheduled in a basic workday. 2.5 USC Chapter 63, Subchapter I— Annual and Sick Leave S'USC § 6302 - General provisions (a) The days of leave provided by this subchapter are days on which an employee would otherwise work and receive pay and are exclusive of holidays and nonworkdays established by Federal statute, Executive order, or administrative order. According to the Federal Communications Commission’s Employee Handbook, page 16, “Tours of duty will be established by the supervisor to cover an eight and one-half hour period, including lunch, and will begin between 7:00 a.m. and 10:00 a.m, and end between 3:30 p.m. and 6:30 p.m.” ow of duty is from 8am until 4:30pm. He does not telework or work a compressed work schedule. admitted that he “usually gets in the office around 8- 3:45-4:00pm.” stated that Pe] okays me coming in 5 -10 HRB is okay if I have to leave early.” He stated that if he is missing more than 2 hours of work, he would put in a leave slip, but for 30 minutes to an hour he does not. R informed [BB S’s that his badge access data from July 12, 2013 to September II, 2013 shows that he s short by 55 hours. stated that 4 -5 months ago hie had to “duck out early” for some personal things. When explained the time period reviewed covered two months, not just a few days in which he may have left early, offered that [Mees me to take leave.” also stated that “I have the leave to cover the hours, just take i.” I showed the spreadsheet and asked if he had any | tase = Cail O1G--13-0041 OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page 6 of 8 REPORT OF INVESTIGATION (continuation sheet) Attachment #1 Media Analysis Report dated 9/6/2013(note: graphic images and language) Attachment #2 Rules of Behavior (ROB) signed by| 1/5/07 Attachment #3 Access control badge data analysis spreadsheet Attachment #4 Memorandum of Interview: Attachment #5 Memorandum of Interview: Case Number Case Tile (O1G-113-0041 OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page 8 of 8 NON-PUBLIC FOR INTERNAL U! INLY UNITED STATES GOVERNMENT FEDERAL COMMUNICATIONS COMMISSION OFFICE OF INSPECTOR GENERAL MEMORANDUM DATE: March 26, 2014 FROM: Attached hereto, and Inspect orwarded with my approval, is a memorandum concluding the Office of rral’s inquiry into the above-captioned matter. Attachment UNITED STATES GOVERNMENT FEDERAL COMMUNCIATIONS COMMISSION OFFICE OF INSPECTOR GENERAL MEMORANDUM DATE: March 26, 2014 cc FROM Overview larch 1 jeontacted the by one of cted nggested mputer misuse. his employees. On March 15, 2014, the MR 0 obtain additional information related to 0 contacting| he direct supervisor ea for the person suspected of co On March TS. 2014, the Ispoke with labout the allegations, rovided an overview of the operated at| s facility in Explained that, because of the unique nature of the work being performed, the workstations used in the| facility are not built on the standard FCC baseline image. NINN further explained thet mployees use a shared account on a shared workstation to access the FCC network for Intemet access and to check Outlook email OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page I of 17 REPORT OF INVESTIGATION (continuation sheet) shared workstation to access the FCC network for Internet access and to check Outlook email. Lastly, explained that the employee suspected of computer misuse] sal ‘and that the| 4. Based on the allegations, OIG initiated an investigation 0 Specificall 1G investigated allegations that AMM used a shared FCC computer to view pornography. Ourinvestgetion found evidence tha IM) used an FCC computer to view pornographic material in violation of the Commission's directive and policies governing cyber security. Investigation To investigate this matter, OIG investigators performed the following steps: 1. Obtained and reviewed screenshots of Mozilla browser history purportedly from the HEDFADMIN®-HP workstation located ns city ar OIG received two (2) pages of browser history screenshots showing activity for the period from March 7, 2014 at 7:16 am EST through March 9, 2014 at 7:51 am EST. 2. Obtained and reviewed Blue Coat firewall log for the period 3/8/2014 between the hours of 7:00 am and 3:00 pm for client IP = 165.135.251.252 (HFDFADMIN2-HP workstation) and web application = “YouTube.” 3. Obtained and reviewed event logs from the HFDFADMIN2-HP workstation for the period from 8/13/12 at 2:04 pm through 3/14/14 at 3:34 pm, 4. Obtained and reviewed the employee sign in log for the IN for tne March 2014 (log is erroneously marked “Mar 2012") 5. Obtained remote access to the HFDFADMIN2-HP workstation using i and performed a limited scope forensic examination of the workstation. Use of Government E Our investigation found evidence as used an FCC computer to view pomographic material in violation of the Commission’s directive and policies governing cyber security. ment (Desktoy mputer) Case Number Case Tile O1G-1-14-0018 OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page 2 of 17 REPORT OF INVESTIGATION (continuation sheet) FCC Directive FCCINST 1479.4, entitled “FCC Cyber Security Program” and effective May 1, 2011, establishes policy and assigns responsibilities for assuring optimal levels of protection required for FCC data and information systems. Section 7.12 of the directive, entitled “Authorized Network/ Workstation System Users”, states that Users must: ‘+ Read, sign indicating acceptance of, and comply with the FCC Computer System User Rules of Behavior, ‘+ Use FCC information system resources only for authorized FCC business purposes, except as provided by the FCC's limited personal use policy; ‘© Be aware of their responsibilities to comply with this directive; ‘The Commission’s Cyber Security Policy, version 3.5 promulgated by the Office of the ‘Managing Director and effective June 20, 2013, establishes the security policies, consistent with Federal regulations, mandates, and directives for the protection of FCC data and information systems using a risk-based approach. Section 2.0.2 of the Cyber Security Policy, entitled “Broad Organizational Policies”, states the following: ‘© Staff must adhere to the security policies contained in FCCINST 1479.4, this policy document, and the FCC Computer System User Rules of Behavior (FCC Form A-201). © Staff using FCC information systems or accounts must not participate in unethical, illegal or inappropriate activities such as: for-profit commercial activities, stealing passwords, stealing credit card numbers, and viewing/exchanging inappropriate written or graphic material (e.g., pomography) Section 2.8 of the Cyber Security Policy, entitled “Policy Violation and Disciplinary Action”, states that “Cyber security-related violations are addressed in the Standards of Ethical Conduct for Employees of the Executive Branch (5 CFR Part 2635); FCC employees may be subject to criminal, civil, or disciplinary action for failure to comply with the FCC security policy.” Section 2.11 of the Cyber Security Policy, entitled “Internet Usage”, states that “You must not use the Internet to view or download pornography.” FCC Form A-201, entitled “FCC Computer System User Rules of Behavior” revised in January 2006, states that “Use of all computer resources, including personal computers, laptops, all parts Case Number: Case Title: OIG-1-14-0018 OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page 3 of 17 REPORT OF INVESTIGATION (continuation sheet) of the FCC Network, communication lines, and computer facilities are restricted to FCC- authorized purposes only. A copy of FCC Form A-201 signed by [EEE on April 8, 2013 is included as Attachment #1 to this Report of Investigation. ‘To investigate th allegation, he III ob sncd and examined log files from =e network, event logs from the HFDFADMIN2-HP workstation, Intemet browser history soreenshots from the HFDFADMIN2-HP workstation and employee signin logs from theif facility. in addition, I oid remote access to the HFDFADMIN2-HP workstation and extracted and reviewed Mozilla Firefox browser artifacts. ‘The employee sign in fog from the IM fcility in III shovs that and ‘were in the| facility during the day shift (7:00 am to 3:30 pm) on March 8, 2014 (the date of the alleged activity), The Security Event Log for the HFDFADMIN2-HP workstation shows that the workstation was used to access the Outlook mailbox for the es on March 8, 2014 at 7:00:01 am EST. The log also shows that no other Outlook mailboxes were accessed from the HFDFADMIN2-HP workstation on March 8, 2014. ‘The Security Event Log for the HFDFADMINI-HP workstation (the other workstation used by HFDF employees to access the Internet and Outlook) shows that the workstation was used to access the Outlook mailbox for account| Jon March 8, 2014 at 7:04:09 am EST. The Ii ticator did not And any evidence that EMM used the HEDFADMINT-HP workstation to access his Outlook mailbox on March 8, 2014. ‘The browser history screenshots, Blue Coat log files, and Mozilla Firefox history file obtained from the HFDFADMIN2-HP workstation showed that the Mozilla Firefox browser on the HFDFADMIN2-HP workstation was used to access eighteen (18) webpages that appear to contain pornography based on the title of the webpage. To determine if the webpages contained pomogrphic mater, th AN oc «workstation pot connected to the FCC network to navigate to the webpages. For those webpages that =a MME sees — To brielly renewed te ‘video file and took screenshots showing video content. The detailed results of the examination of webpages including screenshots showing video content are included in the Appendix to this “MM io ie 18) of ei es at appear NN ees wre marked pss anes tad ber tenor en Youtube. Devt les can nly bese byte yenen uploading te iced hse paso ignated by the person uplanding efile Case Number: Case Title O1G-1-14-0018 OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page 4 of 17 REPORT OF INVESTIGATION (continuation sheet) Report of Investigation In addition to showing access to webpages that appear to contain pomographic material, the browser history screenshots, Blue Coat log files, and Mozilla Firefox history file obtained from the HFDFADMIN2-HP workstation showed that the Mozilla Firefox browser on the HFDEADMIN2-HP workstation was used to access a Yahoo Mail account four (4) times on March 8, 20142, The account name associated with the Yahoo Mail account is |. The did not subpoena account information from Yahoo to determine conclusively that this Yahoo Mail account is associated with However, the Computer Forensics Investigator believes that this Yahoo Mail account is associated with ee Conclusion Our investigation found evidence ‘a I se an FCC computer to view pornographic material in violation of the Commission’ directive and policies governing cyber security Recommendations 1G is referring this matter to one for review and action as they deem appropriate. tachment Attachment #1 FCC Computer System User Rules of Behavior signed by JE on April 8, 2013 * “The[fM] Yahoo Email account was accessed at 07:07 hours, 09:34 hours, 11:47 hours, and 13:06 hours on March Case Number: Case Tile [cre 1-14-0018 OFFICIAL USE ONLY LAW ENFORCEMENT SENSITIVE INFORMATION FCC Office of Inspector General Page 5 of 17

Você também pode gostar