I am republishing this post from July 27, 2010 in view of Pizzagate, which gives this post a new significance.
When you read this post, just remember that a pedophile is defined as an adult with “sexual fondness for and activity” with children, i.e., minors below the age of consent. In other words, the definition doesn’t require that there be sexual abuse of a child; sexual attraction to children is definitive. That in turn means that the Pentagon employees busted for child porn are pedophiles.
Remember the news back in April 2010 that, while the economy crashed, senior staffers at the federal government’s Securities and Exchange Commission were spending hours surfing pornographic websites on government-issued computers while they were being paid to police the financial system?
Now comes news that employees and contractors of the Pentagon are buying and watching child porn on the taxpayers’ dime. Not only is porn-watching on government computers illegal, it is against the law for all Americans to purchase and view child pornography. Worse still, some of the Pentagon child porn creeps have high-level security clearances, which makes them national security hazards because their sexual perversion makes them vulnerable to blackmail.
On July 23, 2010, Dana Hedgpeth of the Washington Post reports that “Federal investigators have identified about 20 Pentagon employees and contractors accused of buying and downloading online child pornography and in some cases used their government-issued computers to view the illegal material.”
According to a 94-page report released by the Defense Department’s inspector general’s office, some of those involved possessed top-secret security clearances and worked for such divisions as the Defense Advanced Research Projects Agency (DARPA), the National Security Agency (NSA) and the National Reconnaissance Office. Those agencies deal with some of the government’s most sensitive intelligence and defense work.
The number of Pentagon employees investigated was not disclosed in the report, but a Pentagon spokeswoman said the probe involved about 20 people who had an “affiliation with the Defense Department” as full-time employees, former military members or contractors. Some of those people have been prosecuted, and some of their cases were dropped for lack of evidence. Other cases remain open.
The cases are part of a wider probe, Operation Flicker, which was started by U.S. Immigration and Customs Enforcement four years ago and which has identified more than 5,000 people who subscribed to online child pornography websites.
The cases detailed in the new report include one involving an employee of Oracle Corp. who had a top-secret clearance and worked on a contract for the National Security Agency. The man subscribed to various child pornography websites and made 21 purchases. After authorities started investigating him, the report said, he attempted to tamper with computers at his office. He was put on administrative leave with pay. He later fled to Libya but was arrested and extradited to the United States.
Another case involved a government employee at the National Defense University in Norfolk who made two purchases from a child pornography website. He pleaded guilty to possession of child pornography and was sentenced to five years in prison.
It is illegal to access pornography with a government computer.
UPDATE (Feb. 12, 2017):
Five years later, the Boston Globe discovered the Pentagon still had not investigated as many as 1,700 of the cases involving employees suspected of child-porn.