December 23, 2024

Former HHS Cybersecurity Director Convicted on Child Porn Charges

Posted on August 27, 2014 by in Security

Following a four-day trial, a federal jury in Nebraska convicted the former acting director of cybersecurity at the United States Department of Health and Human Services (HHS) for his involvement in a child pornography enterprise, the Department of Justice announced on Tuesday.

Timothy DeFoggi, aged 56, is the sixth individual to be convicted as a result of an FBI investigation dubbed “Operation Torpedo,” which has targeted three child pornography websites. The former director has been convicted on three charges: accessing a computer with intent to view child pornography, engaging in a child exploitation enterprise, and conspiracy to advertise and distribute child pornography.

DeFoggi, who will be sentenced on November 7, 2014, is said to have signed up for a membership on an illegal website on March 2, 2012, and was an active member until authorities took down the site in December of the same year. In addition to accessing and soliciting illegal content from other members of the website, investigators said the man also exchanged private messages with other users, expressing interest in raping and murdering children.

The website on which DeFoggi registered an account was one of the three Tor-based pedophile sites owned and operated by 31-year-old Aaron McGrath, of Bellevue, Nebraska, who has been sentenced to 20 years in prison.

Documents obtained by Wired show that the FBI tracked down McGrath after his IP address was provided to the agency by the Dutch national police’s high tech crime unit, which in August 2011 started cracking down on pedo websites.

Operation Torpedo has been controversial because the FBI didn’t immediately arrest McGrath. Instead, they monitored him for a year, time during which they planted malware on the illegal websites in an effort to identify members. The drive-by download method, which the FBI calls a “network investigative technique,” has helped the agency track down the IP addresses, MACs and hostnames of at least 25 individuals, with 14 of them facing trial.

The malware, designed only to identify the computers that had visited the illegal websites, was planted based on search warrants signed by a federal judge, who also allowed the agency to delay notifying the targeted individuals for a period of 30 days. Since some of the suspects learned only well after the 30-day period about the use of malware to identify them, defense lawyers asked the court to throw out the evidence, a motion rejected by the judge.

 Christopher Soghoian of the American Civil Liberties Union (ACLU) has pointed out that while the use of malware might seem justified in the case of Operation Torpedo, because it’s unlikely for innocent people to be prosecuted, the technique could prove problematic in other cases, such as campaigns targeting terrorists, whose online resources might be accessed for research purposes by individuals who have nothing to do with terrorism.

 

Previous Columns by Eduard Kovacs:


SecurityWeek RSS Feed

Imperva Names Former Coverity Chief as New CEO

Posted on August 19, 2014 by in Security

Redwood Shores, California-based Imperva announced on Monday that it has appointed Anthony J. Bettencourt as the company’s new president and chief executive officer. Bettencourt replaces Shlomo Kramer, Imperva founder and CEO, who will continue to serve as chairman of the company’s board and serve as Chief Strategy Officer.

Bettencourt came to Imperva from Coverity Inc., where he recently served as chief executive officer, leading the company through its acquisition by Synopsys for roughly $ 375 million in February 2014. Prior to Coverity, Bettencourt served as CEO of Verity, a provider of enterprise search solutions, leading the company through its acquisition by Autonomy Corp. in 2005.

Bettencourt currently serves on the boards of Proofpoint, Blinkx and Formation Data Systems.

“I am very pleased to be joining Imperva, and look forward to capitalizing on the opportunities at Imperva for Imperva shareholders, employees and partners,” Bettencourt said. “Imperva has established a strong leadership position in the data center security market and has a proven track record of success and innovation. I am excited to be working with the Imperva executive team, board of directors and employees to grow the company to its highest potential.”

“We are very excited to welcome Anthony to Imperva. He was chosen for his distinguished track record of executive leadership, as well as his ability to build highly effective organizations. Anthony has demonstrated an ability to drive shareholder value in competitive market segments and he brings experience driving technology excellence and global growth,” Kramer commented, “I look forward to working with Anthony and am confident that he is the right person to lead Imperva on the next stage of growth.”

Earlier this year, Imperva announced its plans to acquire two security firms and assets from another, in a move that will help extend its data center security strategy across the cloud.

In its most recent quarter, Imperva (IMPV) posted revenues of $ 38.40 million, up 22.7% year-over-year, beating analysts’ estimates by $ 3.98 million. Within services revenue, overall subscription revenue grew 110% to $ 5.3 million, compared to the second quarter of 2013. Combined product and subscriptions revenue was $ 21.8 million compared to $ 18.2 million in the second quarter of 2013. The company said that during the second quarter of 2014, it booked 88 deals with a value over $ 100,000 compared to 76 deals during the second quarter of last year.

As of July 31, the company said it has over 3,300 customers in more than 75 countries around the world.

Managing Editor, SecurityWeek.

Previous Columns by Mike Lennon:


SecurityWeek RSS Feed