US State Dept. worker sentenced for passport snooping

The agency employee is sentenced to 12 months of probation and community service

An employee of the U.S. Department of State was sentenced Wednesday to 12 months of probation for illegally accessing more than 125 electronic passport application files, the U.S. Department of Justice said.

Kevin M. Young, 42, of Temple Hills, Maryland, was also ordered by Judge Alan Kay, of the U.S. District Court for the District of Columbia, to perform 100 hours of community service. Young pleaded guilty on Aug. 17 to one count of unauthorized computer access.

Young has worked full time for the State Department since February 1987, and he has been a contact representative for the Passport Special Issuance Agency for the past eight years, the DOJ said.

Young had access to official State Department computer databases, including the Passport Information Electronic Records System (PIERS), which contains all imaged passport applications dating back to 1994. The passport applications on PIERS contain applicants' names, dates of birth, current addresses, parent information and other personal data.

PIERS access by State Department employees is limited to official government duties.

Between March 11, 2003, and Dec. 21, 2005, Young logged onto the PIERS database and viewed the passport applications of more than 125 celebrities, actors, comedians, professional athletes, musicians, models, a politician and other individuals identified in the press, the DOJ said. In his guilty plea, Young said he had no official government reason to view these passport applications, and his reason for doing so was "idle curiosity," the DOJ said.

Young is the eighth current or former State Department employee or contractor to plead guilty since September 2008 to charges related to passport snooping. Most of the other defendants have received sentences of probation, community service, or fines.

A group of State Department employees and contractors were targeted for prosecution after March 2008 news reports of employees there accessing the electronic passport files of three presidential candidates, Senators John McCain, Barack Obama, now U.S. president, and Hillary Clinton, now secretary of state.

The inspector general's office at the State Department later found that there had been widespread breaches of PIERS.

The inspector general's office looked at the passport files of 150 politicians, entertainers and athletes, and found that 127 of those passports had been accessed at least once between September 2002 and March 2008.

Those passport files were accessed 4,148 times during that time frame, and one person's passport was searched 356 times by 77 users.

Join the CSO newsletter!

Error: Please check your email address.

Tags USA governmentsecurityinsider threatspassport snoopingdoj

More about Department of JusticeDOJ

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Grant Gross

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place