Feeds

Malware not man blamed in child abuse download case

Replacement PC was 'ticking time bomb'

Next gen security for virtualised datacentres

A Department of Industrial Accidents investigator has been cleared of child porn possession charges after a forensic investigation revealed that malware was to blame for depraved smut on his company laptop.

Michael Fiola, 53, of Rhode Island, went through a massive ordeal after images of child abuse were discovered on a replacement machine he received in November 2006, following a laptop theft. He lost his job in March 2007 after an internal investigation, prompted by a Verizon wireless bill four times higher than his colleague, unearthed the suspicious content. Fiola had worked for the agency investigating workers' compensation fraud for seven years prior to his dismissal.

The case was forwarded onto the authorities who filed a criminal complaint in August 2007.

But subsequent forensic investigation discovered that malware was responsible for silently downloading images of pre-pubescent kids onto the machine. Computer experts hired by both the defence and prosecution agreed with this analysis.

Computer forensic analyst Tami Loehrs said that malware surreptitiously served up pre-teen pornographic images onto the machine without the awareness of its user. Loehrs described the case as "one of the most horrific" she'd ever dealt with.

In her report to the court, Loehrs said "the laptop was compromised by numerous viruses and trojans, and may have been hacked by outside sources."

All the offending images were loaded into locations reserved for cached web pages. Crucially there was no sign that any user had viewed or attempted to access this content.

“There is no evidence to support the claim that Michael Fiola was responsible for any of the pornographic activity,” Loehrs wrote.

Two computer forensic experts hired by the prosecution came back with the same conclusion.

"The overall forensics of the laptop suggest that it had been compromised by a virus," said Jake Wark, spokesman for Suffolk District Attorney Daniel Conley.

The case against Fiola has been dropped, but he still wants his day in court following months of hell when friends turned against him, leaving his faithful wife Robin as his only supporter. Fiola, described by his wife as "computer-illiterate", intends to sue his former employers over their actions in the case, the Boston Herald reports.

DIA spokeswoman Linnea Walsh said that the agency stood by its handling of the case.

Fiola’s lawyer Timothy Bradl criticised this stance: "Imagine this scenario: Your employer gives you a ticking time bomb full of child porn, and then you get fired, and then you get prosecuted as some kind of freak," he said. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.