It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
JANUARY 5--The government’s pursuit of suspects trafficking in child pornography recently led federal agents to a familiar address--the FBI’s Washington, D.C. headquarters, where a bureau official is the subject of an ongoing criminal probe, The Smoking Gun has learned.
The investigation by the Department of Justice’s inspector general is focusing on FBI employee Joseph Bonsuk’s receipt of nearly 80 illicit images that were e-mailed to him by an Illinois sex offender whose rap sheet includes felony convictions for bank robbery and solicitation of a minor.
Court records reveal that Bonsuk’s name surfaced in the wake of an FBI probe of Ronald Norweathers, an Illinois felon who was arrested in December 2009 for allegedly sharing hundreds of illicit images and videos via the GigaTribe peer-to-peer network. A criminal complaint notes that Norweathers, 29, unknowingly allowed access to his child porn stash to three different undercover operatives.
Following his arrest, Norweathers, pictured at left, “voluntarily authorized the FBI to take over control of and use his ‘online presence.’” This tactic allows agents to secretly assume control of a suspect’s screen names, nicknames, and e-mail addresses, which can provide immediate access to networks of child porn traders.
A subsequent subpoena revealed that Bonsuk was the AOL account’s subscriber. His contact information included telephone numbers at his Baltimore home and *SNIP*, which is a number at FBI Headquarters,” according to an affidavit sworn by a Department of Justice investigator.
After realizing that Bonsuk worked for the FBI, investigators secretly copied the hard drive of Bonsuk’s office computer. While a forensic examination did not turn up any illicit images, a variety of evidence retrieved from the machine linked him to the AOL address “utilized by Bonsuk on March 13, 2009 to receive child pornography.”
While reviewing a Yahoo account used by Norweathers, FBI agents discovered “several exchanges” with an AOL e-mail account. One March 2009 correspondence from Norweathers to the AOL account included a file with 78 child porn images. After the file was sent, Norweathers received an e-mail from the AOL account saying, “I don’t want kiddie porn scary.” Norweathers responded, “well duh pick through for the teen stuff I sent how it came to me.”
A subsequent subpoena revealed that Bonsuk was the AOL account’s subscriber. His contact information included telephone numbers at his Baltimore home and *SNIP* , which is a number at FBI Headquarters,” according to an affidavit sworn by a Department of Justice investigator.
After realizing that Bonsuk worked for the FBI, investigators secretly copied the hard drive of Bonsuk’s office computer. While a forensic examination did not turn up any illicit images, a variety of evidence retrieved from the machine linked him to the AOL address “utilized by Bonsuk on March 13, 2009 to receive child pornography.”
While a forensic examination did not turn up any illicit images, a variety of evidence retrieved from the machine linked him to the AOL address “utilized by Bonsuk on March 13, 2009 to receive child pornography.”