IG: Mental Health - The Columbus Dispatch

Transcription

IG: Mental Health - The Columbus Dispatch
State of Ohio
Office of the Inspector General
RANDALL J. MEYER, Inspector General
Report of
Investigation
AGENCY: OHIO DEPARTMENT OF MENTAL HEALTH
FILE ID NO.: 2011-176
DATE OF REPORT: JUNE 24, 2013
The Office of the Ohio Inspector General ...
The State Watchdog
“Safeguarding integrity in state government”
The Ohio Office of the Inspector General is authorized by state law to investigate alleged
wrongful acts or omissions committed by state officers or state employees involved in the
management and operation of state agencies. We at the Inspector General’s Office
recognize that the majority of state employees and public officials are hardworking,
honest, and trustworthy individuals. However, we also believe that the responsibilities of
this Office are critical in ensuring that state government and those doing or seeking to do
business with the State of Ohio act with the highest of standards. It is the commitment of
the Inspector General’s Office to fulfill its mission of safeguarding integrity in state
government. We strive to restore trust in government by conducting impartial
investigations in matters referred for investigation and offering objective conclusions
based upon those investigations.
Statutory authority for conducting such investigations is defined in Ohio Revised Code
§121.41 through 121.50. A Report of Investigation is issued based on the findings of the
Office, and copies are delivered to the Governor of Ohio and the director of the agency
subject to the investigation. At the discretion of the Inspector General, copies of the
report may also be forwarded to law enforcement agencies or other state agencies
responsible for investigating, auditing, reviewing, or evaluating the management and
operation of state agencies. The Report of Investigation by the Ohio Inspector General is
a public record under Ohio Revised Code §149.43 and related sections of Chapter 149.
It is available to the public for a fee that does not exceed the cost of reproducing and
delivering the report.
The Office of the Inspector General does not serve as an advocate for either the
complainant or the agency involved in a particular case. The role of the Office is to
ensure that the process of investigating state agencies is conducted completely, fairly, and
impartially. The Inspector General’s Office may or may not find wrongdoing associated
with a particular investigation. However, the Office always reserves the right to make
administrative recommendations for improving the operation of state government or
referring a matter to the appropriate agency for review.
The Inspector General’s Office remains dedicated to the principle that no public servant,
regardless of rank or position, is above the law, and the strength of our government is
built on the solid character of the individuals who hold the public trust.
Randall J. Meyer
Ohio Inspector General
REPORT
OF
INVESTIGATION
FILE ID NUMBER:
2011-176
SUBJECT NAME:
1) Brian Bollinger
2) Weldon Cartwright
3) Charles Combs
4) Scott Cooper
5) Scott Prater
6) Jeff Weese
POSITION:
Police Officer 2 (1, 4, 5)
Custodial Worker (3, 6-retired)
Psychiatric/MR Nurse (2)
AGENCY:
Ohio Department of Mental Health
BASIS FOR INVESTIGATION:
Agency Referral
ALLEGATIONS:
Misuse or abuse of state property or equipment
INITIATED:
September 28, 2011
DATE OF REPORT:
June 24, 2013
INITIAL ALLEGATION AND COMPLAINT SUMMARY
On September 21, 2011, the Office of the Ohio Inspector General received a complaint from the
Ohio Department of Mental Health (ODMH) alleging six ODMH employees, Brian Bollinger,
Weldon Cartwright, Charles Combs, Scott Cooper, Scott Prater, and Jeff Weese were using stateissued computers “beyond the scope of consent and surfing non-work related websites containing
pornography.1” An investigation was opened by the Office of the Ohio Inspector General on
September 28, 2011. The Ohio State Highway Patrol (OSHP) assisted with the investigation by
helping to obtain several computers from the employees’ worksites and with a preliminary
analysis of the employees’ Internet activity.
BACKGROUND
Ohio Department of Mental Health
The Ohio Department of Mental Health (ODMH) is responsible for overseeing the state’s mental
health service system. ODMH operates six regional psychiatric hospitals throughout the state. The
department works with community-based organizations that are responsible for providing mental
health services. The director of ODMH acts as the chief executive officer of the agency and is
appointed by the governor and confirmed by the Ohio Senate. Funding for operation of the
department is provided through the state general revenue fund, federal funding, and payments
received from insurance companies for services provided.
Effective July 1, 2013, ODMH will merge operations with the Ohio Department of Alcohol and Drug
Addiction Services to become the Ohio Department of Mental Health and Addiction Services.2
Regional Psychiatric Hospitals
ODMH operates six regional psychiatric hospitals in the following Ohio cities:

Appalachian Behavioral Healthcare – Athens

Heartland Behavioral Healthcare – Massillon

Northcoast Behavioral Healthcare – Northfield and Cleveland3
1
The term “pornography” is used in this report when the Ohio Department of Mental Health used it in written
memorandums or reports. Otherwise, the term “sexually explicit material” is used as that is the term ODMH uses in
their policy given to employees.
2
Source: Biennial budget documents
3
Northcoast Behavioral Healthcare’s Cleveland facility has since been closed.
1

Northwest Ohio Psychiatric Hospital – Toledo

Summit Behavioral Healthcare – Cincinnati

Twin Valley Behavioral Healthcare – Columbus
Ohio Revised Code §5119.14, Appointing special police officers for institutions, states the
managing officer of an ODMH institution may designate employees to be special police officers
of the department. These police officers must successfully complete a basic training program
approved by the Ohio Peace Officer Training Commission and be certified by the commission.
The officers are “subject to the rules of the department, shall protect the property of the
institutions and the persons and property of patients in the institutions, suppress riots,
disturbances and breaches of the peace, and enforce the laws of the state and the rules of the
department for the preservation of good order.”
Applicable Policies Reviewed During the Investigation
ODMH policy AI-78, Use of Internet, E-mail and other IT Resources, was directed to all ODMH
employees and was effective as of October 14, 2008. Section E.4., Unacceptable use, states any
use of IT resources that has the appearance of impropriety is strictly prohibited. Specific uses
that are strictly prohibited in the policy and relating to this investigation included the following:

Accessing or participating in any type of personal ads or services, such as or similar to
dating services, matchmaking services, companion-finding services, pen pal services,
escort services, or personals ads.

Downloading, displaying, transmitting, duplicating, storing, or printing sexually explicit
material.

Any use of state-provided IT resources to operate, participate in, or contribute to an
online community, including, but not limited to, online forums, chat rooms, listserv,
blogs, wikis, peer-to-peer file sharing, and social networks ... unless organized or
approved in writing by the CEO or Central Office administrator.
The IT resources policy also states the installation and use of unlicensed software is strictly
prohibited, and only the ODMH Office of Information Services or designated information
technology staffs are permitted to install software on ODMH computers.
2
ODMH policy AI-53, Password and Personal Identification Number Security, was directed to all
ODMH employees and was effective as of October 14, 2008. The policy specifies the minimum
requirements for the creation and use of passwords by employees. The policy states “passwords
are selected or assigned to individual users. Shared passwords are not permitted. Users are
responsible for actions taken using their passwords, and should not share or divulge their
passwords to anyone, including system administrators, managers, or other staff members who
may ask.”
INVESTIGATIVE SUMMARY
On September 21, 2011, the Ohio Department of Mental Health referred a complaint to the
Office of the Ohio Inspector General regarding allegations of improper use of state-issued
computers by six employees: Brian Bollinger (Police Officer 2), Weldon Cartwright (Psychiatric
Nurse), Charles Combs (Custodial Worker), Scott Cooper (Police Officer 2), Scott Prater (Police
Officer 2) and Jeff Weese (Custodial Worker). According to the ODMH referral memorandum
addressed to the Office of the Ohio Inspector General, the department first identified the alleged
prohibited Internet activity in November 2010 through Internet monitoring security reports
generated by an ODMH network-based computer software which monitors employees’ Internet
activity. These reports identified select sites visited by and associated with each employee’s user
profile,4 and defined numerous sites as falling within the ODMH classification defined as
“pornography.” A detailed Internet monitoring security report was generated by ODMH listing
each site visited through the user profiles associated with each of the employees.
ODMH Security Consultant Nacrina Alvarez de Blanco was assigned to collect additional
information regarding the allegations and instructed Information Security Officer Bruce Orr and
Northcoast Behavioral Healthcare Chief of Police James Wuliger to review the report. ODMH
continued to monitor the employees’ Internet activity, and additional information was gathered
by Orr and Wuliger.
4
A user profile is a unique user identification or name assigned to each ODMH employee that, in accordance with
ODMH policy, must be used when logging on to access an ODMH computer. The user names are the employee’s
last name and first initial of their first name.
3
When providing the security reports to the Office of the Ohio Inspector General, ODMH stated
the reports generated show categories of the type of site visited, such as search engine, games,
educational websites, or “other.” The reports also classify each site visited as acceptable,
unacceptable, or neutral, depending on pre-selected criteria to reflect the agency’s policies on
acceptable use of the Internet. For example, an acceptable site might be a search engine, a
government website, or legal website. Unacceptable sites were established based on ODMH
policy AI-78 and included, but were not limited to, the following categories ODMH defined as:
“web email, chat/instant messaging, travel, vehicles, TV/video streaming, social networking, and
pornography.” Sites found in the category “other,” required further direct analysis and scrutiny
in order to be reclassified as acceptable, unacceptable, or neutral. In addition, the report
provided by ODMH included a review of the key words used in the search engine sites where a
user had entered sexually explicit terms.
The Office of the Ohio Inspector General compiled the information from the ODMH Internet
monitoring security reports between August 2010 and December 2010. The following table
shows the number of sites visited by the user name assigned to the employee, and the number of
visits to the sites, sorted by ODMH website classification:
Classifications and Number of Hits by Employees Under Investigation
Employee
Acceptable
Unacceptable
Neutral
Total
Pornography5
Bollinger
3,701
1,084
67
4,852
295
Weese
2,170
3,312
505
5,987
292
Prater
1,949
669
223
2,841
223
Cooper
1,987
626
209
2,822
184
Combs
699
218
12
929
109
Cartwright
449
133
26
608
46
Given the limitations of the ODMH security reports, the Office of the Ohio Inspector General, in
conjunction with the Ohio State Highway Patrol, decided to perform a more detailed analysis of
the computers used by the six employees. As a result, 12 computers were obtained on October
20, 2011, at the following locations:
5
As defined and classified by the Ohio Department of Mental Health.
4

Heartland Behavioral Healthcare – two in Massillon

Northcoast Behavioral Healthcare – three in Northfield and three in Cleveland

Northwest Ohio Psychiatric Hospital – four in Toledo
Additionally, one computer located at Appalachian Behavioral Healthcare in Athens and three
computers at Twin Valley Behavioral Healthcare in Columbus were obtained by ODMH on
October 6, 2011, and moved to a secure location until retrieved by OSHP. These computers
were later identified as being used by Combs and Cartwright.
The OSHP computer forensic unit began with an initial review of the computers to ensure that
images, videos, or websites viewed did not contain underage individuals. When it was
determined by OSHP there were no such items on the computers, 10 computers associated with
Bollinger, Cooper and Prater’s user names were turned over to the Office of the Ohio Inspector
General on July 9, 2012, for further analysis. These employee user profiles were selected based
on the number of times sites classified by ODMH as “pornography” were identified on the
ODMH Internet monitoring security reports. Weese retired on December 1, 2011, and no
analysis was performed to review his usage. Of the 10 computers analyzed, one did not contain
user profiles for Bollinger, Cooper, or Prater, and another had a damaged hard drive and was
inaccessible. For the eight remaining computers, the Office of the Ohio Inspector General
focused on four areas in reviewing the records found in each computer to determine if sexually
explicit websites, images, or videos were viewed or downloaded in violation of ODMH Policy
AI-78, Use of Internet, E-mail and other IT Resources, and Section E.4.
Typed Uniform Resource Locator (URL) Information
ODMH employees access the Internet by using the Microsoft Windows Internet Explorer
application. Typed URLs are entries made by the user in the Internet Explorer’s6 address bar and
are manually typed by the user to identify a unique website the user would like to access. When
pressing “enter” to access the website, the Microsoft Windows operating system registry also
records the address. URL entry history is stored under a user’s profile in the registry and can be
reviewed at a later time.
6
Internet Explorer is Microsoft Corporation software used to access the Internet.
5
Cookies
A cookie is a small piece of data associated with a user profile received from a website and
stored in a user’s web browser while the user is accessing a website. When the user accesses the
same website in the future, the data stored in the cookie can be retrieved by the website to allow
review of the user’s previous activity. Cookies are actual files and are saved to a folder under a
user’s profile. Internet Explorer also maintains a separate database file that lists cookies
associated with a user profile.
Temporary Internet Files
Internet Explorer uses a temporary file to store copies of website content on a computer’s hard
drive. The feature is used to improve network performance and in the process leaves data on a
user’s computer. A user can delete information contained in the folder through Internet Explorer
or manually. Similar to cookies, Internet Explorer maintains a separate database list of all
temporary files associated with a user profile.
Cache Internet Files
A web cache is a mechanism for the temporary storage, or caching, of web documents. Internet
Explorer maintains a separate database for cached files that can be used as another source of
Internet history.
The Office of the Ohio Inspector General also reviewed files that had been downloaded and
saved to the computer hard drives and any time the user attempted to delete them.
In addition, a review of the computers found anti-forensic software had been downloaded to
computers containing user profiles for Bollinger and Cooper. These software programs gave the
user the ability to “clean” the computer and delete information from the typed URL information,
cookie, temporary Internet, and cached Internet files.
Brian Bollinger
Three of the four computers obtained from Northwest Ohio Psychiatric Hospital in Toledo and
analyzed by the Office of the Ohio Inspector General contained Bollinger’s user profile.
6
Bollinger’s profile showed continual use of anti-forensic software programs on two of the
computers. On one computer, one program was executed more than 1,900 times and appeared to
have been set to run automatically once a day.
The following is the information the Office of the Ohio Inspector General was able to obtain
from the analysis of Bollinger’s user profile on three computers:

Typed URL Information – No information was obtained from any of the computers. The
analysis was unable to determine if the anti-forensic programs or the user deleted the
URL history.

Cookies – On one computer, it appeared the cookies were recently deleted. However, the
files were recovered. On the other two computers, the cookie folder was empty and the
backup database file had been corrupted or cleared.

Temporary Internet Files – Information from two computers was recovered through the
temporary Internet file folder or the backup database file. One computer contained no
folders or files. The information recovered contained website addresses that were later
analyzed.

Cache Internet Files – All three computers contained a fully intact cache file providing a
record of Internet activity associated with Bollinger’s user profile, and allowing the
website addresses in the cache file to be further analyzed.
From the recovered files, the analysis determined four instances of Bollinger accessing sexually
explicit material saved as cookies, and one image that had been deleted. The information
remaining from the deleted file contained Bollinger’s user profile. A review of the website
addresses from the cache file associated with Bollinger’s user profile showed that the user:

Viewed a website with free online communities where members can share discussions,
pictures, and reviews. From the website address information, the Office of the Ohio
Inspector General was able to determine Bollinger’s user profile accessed approximately
30 different community forums related to sexually explicit material.

Viewed websites for adults to meet for casual sex. The sites require participants to pay
for a monthly subscription fee but offer limited free accounts or trials. The analysis
7
determined an individual logged into a subscription account under Bollinger’s user
profile.

Accessed 14 sexually explicit videos from a website claiming to have “the best bisexual
porn movies.”
Given the numerous occasions in which the anti-forensic software was used, the Office of the
Ohio Inspector General was unable to determine the full list of sites potentially visited under
Bollinger’s user profile.
On December 4, 2012, the Office of the Ohio Inspector General interviewed ODMH Police
Officer Brian Bollinger. When asked to explain how the log-in process works on the computers
at ODMH, Bollinger stated everyone has a user name and password that is used to log-on to a
computer. The officers have access to any computer in the facility, but the officers primarily use
three computers in the squad room. Bollinger also said, “most of the guys in the office know
each other’s passwords.” When asked if he had given his password to anyone, he said “there
was (sic) a couple of guys that knew it.”
Bollinger explained it was possible for someone else to use a computer after an individual signed
on and later left the office for a period of time. When asked if the system logged an employee
off the computer if it was inactive for any length of time, Bollinger replied, “I think so. Now I
don’t know what the timeframe is though.”
Bollinger was then asked if he knew about the anti-forensic software installed on the computers
in the squad room. Bollinger stated Lee Lawrence, a retired officer who served as their
lieutenant for a period of time, had downloaded the anti-forensic software to the computers, but
Bollinger did not know why. Bollinger believed Kevin Marshall, the information service officer
for the Northcoast Behavioral Healthcare facility, may have given Lawrence permission to
download the anti-forensic software program. When asked if Bollinger knew the purpose of the
software, Bollinger said Lawrence explained to him “it’s supposed to delete your browsing
history.” Bollinger also said the anti-forensic software program was run “at the end of our shift
all the time.”
8
The Office of the Ohio Inspector General provided Bollinger a list of the websites visited under
Bollinger’s user profile from the ODMH security reports. Bollinger stated he knew about the
adult dating website, but denied accessing it on the computer he used at work. Other sites listed
on the ODMH report were classified as unacceptable under ODMH policies, such as
TicketMaster and personal email accounts. Bollinger admitted accessing those sites, saying he
would check his personal email accounts as outside agencies would email items to him on that
account.
When asked if he “… surfed, looked at, accessed adult oriented material during the course of
your duty day on a state computer in this facility,” Bollinger replied, “… probably at some point,
yes.” Bollinger stated further that he “probably” saw others accessing the material, including
Lawrence and Cooper. Bollinger also stated no one had ever told the unit’s personnel to stop
accessing restricted sites, and when trying to access some websites, the sites came up as
restricted. Bollinger went on to say, “… but there’s some we can get into.”
On January 22, 2013, the Office of the Ohio Inspector General contacted Lee Lawrence by
telephone who twice stated he did not remember if he visited “explicit adult” websites.
Lawrence commented that it was easy for others to place the blame on him since he was retired.
Lawrence further stated he and the other officers at the facility knew that Cooper and Bollinger
kept their passwords in their desk drawers. When asked about Bollinger’s comments regarding
Lawrence downloading the anti-forensic software on the ODMH computers, Lawrence stated
that Marshall allowed him to “… put it on because the computers were slow.” Lawrence also
instructed the other officers on how to use the software, but he “… never issued a directive for
the police officers to run the software at the end of each shift.” Lawrence denied the software
would allow anyone to hide anything, as the Internet usage would have been captured by the
ODMH server in the central office.
On January 18 and February 12, 2013, the Office of the Ohio Inspector General contacted
Northcoast Behavioral Healthcare Information Service Officer Kevin Marshall by telephone.
Marshall stated he utilized the anti-forensic software on the computers at Northwest Ohio
Psychiatric Hospital after a computer virus had been detected on the computers. Marshall stated
9
he had not used the software in more than a year. Marshall denied telling anyone to download or
install the software on any of the computers or to run the program at the end of each shift.
Marshall was also not aware the officers were exchanging password information and stated it
was prohibited by both ODMH and state policy. Marshall added that he thought the Toledo
office was more relaxed about the policy prohibiting the exchange of passwords, but thought the
police officers would be “more strict” when it came to security issues. When asked if the
computers automatically log-off after several minutes of inactivity, Marshall stated the
computers would “lock” a user from using the computer after 15 minutes of inactivity. The user
would then need to enter his or her password to “un-lock” the computer. The user profile would
not be logged-off unless the user selected “log-off” from the main Windows menu, or the user
shut down the computer. When the computer is “locked” it remains on the user profile and only
a password is needed to “un-lock” the computer.
Scott Cooper
All four computers obtained from Northwest Ohio Psychiatric Hospital in Toledo and analyzed
by the Office of the Ohio Inspector General contained Cooper’s user profile, including one
computer located in Cooper’s office. Cooper’s profile also showed use of anti-forensic software
programs on all of the computers.
The following is the information the Office of the Ohio Inspector General was able to obtain
from the analysis of Cooper’s user profile on the four computers:

Typed URL Information – Information was obtained from one of the four computers,
specifically, only two entries. The analysis was unable to determine if the anti-forensic
software programs or the user deleted the information.

Cookies – On two computers, it appeared the cookies were recently deleted. However,
the files were recovered. On the other two computers, the folder was empty but the
information was able to be recovered from the backup database file.

Temporary Internet Files – Information from all four computers was deleted from the
temporary Internet file folder. However, information from the backup database on two of
the four computers was recovered.
10

Cache Internet Files – All four computers contained a fully intact cache file and
contained Internet activity associated with Cooper’s user profile.
From the recovered files, an analysis determined approximately 35 unique cookies related to
sexually explicit images were present and associated with Cooper’s user profile. A review of the
website addresses accessed with Cooper’s user profile found:

A website had been viewed with free online communities where members can share
discussions, pictures and reviews. From the website address information, the Office of
the Ohio Inspector General determined approximately 16 different community forums
related to sexually explicit material were accessed.

Sexually explicit words or sexually explicit phrases had been entered into website search
engines to locate sexually explicit images.

Multiple sexually explicit websites had been accessed, including a website billing itself
as “an Internet-based hardcore pornography production company.”
The Office of the Ohio Inspector General was also able to locate approximately 126 sexually
explicit images on the hard drive of the computer located in Cooper’s office. These images had
previously been deleted, but the information contained in the file’s data associated them with
Cooper’s user profile.
On December 4, 2012, the Office of the Ohio Inspector General interviewed Cooper at
Northwest Ohio Psychiatric Hospital. Cooper admitted giving out his password to OSHP7 in
case it was needed, but Cooper also said he did not directly give his password to his co-workers.
Cooper later stated if anyone was nearby when he provided his password to OSHP, they may
have overheard his conversation. Cooper also admitted to writing down his passwords on a note
card.
7
All alleged criminal matters occurring on ODMH property must be referred to OSHP. After the assessment of the
complaint, OSHP may pursue an investigation or defer to the ODMH police officers for further investigation. This
would require OSHP to have access to ODMH computer system to obtain information needed in the course of an
investigation.
11
When asked about the anti-forensic software installed on his computer, Cooper stated Lawrence
had downloaded anti-forensic software on the computer Cooper used, and Cooper knew the antiforensic software was used to clean Internet history from the computer. Cooper also stated
Lawrence instructed the staff to run the software program at the beginning or end of each shift.
The Office of the Ohio Inspector General provided to Cooper a list of the websites visited under
Cooper’s user profile from the ODMH security reports. Cooper admitted to accessing sites
classified as inappropriate under ODMH policy, such as personal email accounts and shopping
websites, or played games on his “downtime.” Cooper also admitted to visiting websites related
to motorcycles or motorcycle clubs, and some of the images may have included topless women.
Cooper also admitted to visiting websites that had images of crime scene photos but stated he
had “… no reason to go to a porn site to look at porn.” Cooper stated he knew some websites
were restricted by ODMH and if access was attempted, a message would appear stating the
website was restricted. When asked what his definition of “porn” was, he replied that he did not
think images of topless women necessarily qualified.
Scott Prater
Six computers were obtained from Northcoast Behavioral Healthcare in Northfield and
Cleveland. Four of the computers contained Prater’s user profile. None of the computers
analyzed utilized anti-forensic software. The following is the information the Office of the Ohio
Inspector General was able to obtain from the analysis of Prater’s user profile on the four
computers:

Typed URL Information – Information was obtained from three of the four computers.

Temporary Internet Files – Information from all four computers was recovered from the
backup database.
A review of the website addresses accessed with Prater’s user profile found:

A blog was visited listing other websites displaying sexually explicit images and videos.
URL history provided information indicating specific page information was typed into
the URL address box, and access to the websites was not just achieved by browsing and
clicking on hyperlinked websites in the blog. In total, there were approximately 30
12
instances in which the typed URL history for this blog showed access to sexually explicit
material.

Approximately 90 other unique blogs were accessed containing websites linked to
sexually explicit material.

The names of specific celebrities were searched who were shown in sexually explicit
images or videos, sexually explicit phrases, or sexually explicit websites within a search
engine. Also, the search engine’s image feature was used to access sexually explicit
images.

Websites that contained pay-to-view sexually explicit videos were visited.
Additionally, the Office of the Ohio Inspector General was able to locate approximately 2,600
sexually explicit images and fragments of sexually explicit videos on the hard drive of two
computers associated with Prater’s user profile. Some of these images had previously been
deleted, but the information contained in each image file’s data connected the file to Prater’s user
profile.
On December 12, 2012, the Office of the Ohio Inspector General interviewed Prater at
Northcoast Behavioral Healthcare. At the beginning of the interview, Prater volunteered that he
“… looked at some sites that I probably shouldn’t have looked at …” and classified them as nonwork related. Prater provided examples such as looking at music videos or listening to music.
Prater also admitted to knowing how to use a search engine to by-pass any ODMH restrictions
and view images. The Office of the Ohio Inspector General presented to Prater a copy of the
ODMH security logs detailing all the websites that were in question. When asked if he wished to
elaborate more on his activities, Prater responded “not really.” Prater was also asked if he could
recall the last time he had inappropriately used a state-issued computer, to which Prater
responded, “I would prefer not to answer that, if I might.” At the conclusion of the interview,
Prater said, “I’m embarrassed,” and “I know, it was stupid.”
Weldon Cartwright and Charles Combs
On January 8, 2013, Weldon Cartwright was interviewed by the Office of the Ohio Inspector
General regarding the information contained in the ODMH security reports showing
13
Cartwright’s user profile associated with viewing sexually explicit websites. During the
interview, Cartwright admitted to visiting sexually explicit websites and other non-work related
sites, including travel or social networking sites. Cartwright stated he would go to the explicit
websites once or twice a week for an hour at a time, and admitted the last time he visited a
sexually explicit website was during his current work shift. Cartwright also stated he would
delete the Internet history from the computer.
Charles Combs was interviewed by the Office of the Ohio Inspector General on January 9, 2013.
Combs denied visiting sexually explicit websites, but admitted to visiting so called “shock sites.”
These sites, as defined by urbandictionary.com, are websites intended to be offensive or
disturbing to viewers containing material of high shock value which is also considered distasteful
and is generally of a pornographic or extremely violent nature. Combs was unaware the sites
would be classified as “pornography” on the security report, and stated he believed the websites
were not restricted by ODMH’s security system. Combs also admitted to watching movies on
his state-issued computer but said they were on a DVD and not downloaded from the Internet.
CONCLUSION
The Office of the Ohio Inspector General was able to establish, through the analysis of
computers obtained from Heartland Behavioral Healthcare, Northcoast Behavioral Healthcare,
and Northwest Ohio Psychiatric Hospital, that sexually explicit websites, images, and videos had
been viewed or downloaded, and found evidence the actions were taken by individuals
employing user profiles belonging to Brian Bollinger, Scott Cooper, and Scott Prater. While all
admitted to viewing inappropriate websites in violation of the Ohio Department of Mental Health
policies, none expressly admitted to viewing sexually explicit material.
Both Bollinger and Cooper said other employees knew their passwords, and implied someone
else could have used their user profiles to access the sites. However, the analysis showed this
was not a plausible explanation because whoever was employing the user profiles attributed to
Bollinger and Cooper to access the sexually explicit websites also accessed non-work related
sites such as personal email accounts, shopping sites, and other websites that required a personal
user name and password to log-in. Access to these sites was in close sequence to, before,
14
between, or after the instances when sexually explicit sites were viewed. In order for anyone
else to use either Bollinger’s and Cooper’s user profiles to access the sexually explicit websites,
the individual would not only need to have Bollinger’s and Cooper’s ODMH passwords, but also
have knowledge of Bollinger’s and Cooper’s personal user names and passwords for all the other
websites requiring a log-on procedure.
Computers containing Bollinger and Cooper’s user profiles also showed the use of anti-forensic
software to clear the Internet history and temporary files. Both stated the software was
downloaded by an employee, Lee Lawrence, who had since retired. Both also alleged Lawrence
viewed sexually explicit websites and implied he may have logged-in under their user profiles.
When contacted by the Office of the Ohio Inspector General, Lawrence admitted to downloading
the software, but stated he was instructed to do so by Kevin Marshall. Lawrence did not
remember viewing inappropriate sites on his work computer.
When contacted by the Office of the Ohio Inspector General, Marshall stated he had used the
anti-forensic software to “clean” the machines after a virus was detected on the computers.
However, Marshall denied instructing Lawrence to download the software on the computers and
informing employees they were to use the software every day.
Finally, Weldon Cartwright admitted to viewing sexually explicit material once or twice a week
for an hour at a time during his work shift. Charles Combs also admitted to viewing
inappropriate websites but denied they were sexually explicit in nature.
15
The following is a summary of the findings related to this investigation:
Chart of Wrongful Acts of Omissions by ODMH Employees
Employee
Brian Bollinger
Scott Cooper
Scott Prater
Weldon Cartwright
Charles Combs
Applicable Policy
ODMH Policy AI-78, Use of
Internet, E-mail and other IT
Resources - accessing prohibited
websites
ODMH Policy AI-78, Use of
Internet, E-mail and other IT
Resources – installing
unapproved software
ODMH Policy AI-53, Password
and Personal Identification
Number Security – providing
password to other employees
ODMH Policy AI-78, Use of
Internet, E-mail and other IT
Resources - accessing prohibited
websites
ODMH Policy AI-78, Use of
Internet, E-mail and other IT
Resources – installing
unapproved software
ODMH Policy AI-53, Password
and Personal Identification
Number Security – providing
password to other employees
ODMH Policy AI-78, Use of
Internet, E-mail and other IT
Resources - accessing prohibited
websites
ODMH Policy AI-78, Use of
Internet, E-mail and other IT
Resources - accessing prohibited
websites
ODMH Policy AI-78, Use of
Internet, E-mail and other IT
Resources - accessing prohibited
websites
16
Accordingly, there is reasonable
cause to believe…
A wrongful act or omission
occurred
A wrongful act or omission
occurred
A wrongful act or omission
occurred
A wrongful act or omission
occurred
A wrongful act or omission
occurred
A wrongful act or omission
occurred
A wrongful act or omission
occurred
A wrongful act or omission
occurred
A wrongful act or omission
occurred
RECOMMENDATION(S)
The Office of the Ohio Inspector General makes the following recommendations and asks the
Ohio Department of Mental Health to respond within 60 days with a plan detailing how the
recommendations will be implemented. The Ohio Department of Mental Health should:
1) Review the actions of the employees listed in this report and consider whether
administrative action is in order.
2) Consider further restrictions on the Internet access currently granted to the staff employed
by ODMH.
3) Review the applicable Internet and password policies with all the employees.
4) Consider developing and implementing a procedure granting temporary log-in and
password access when investigatory agencies require access to the ODMH computer
system relative to an official investigation.
5) Consider implementing software to monitor and block computer activity in addition to
conducting regular reviews of network activity logs.
17
State of Ohio
Office of the Inspector General
RANDALL J. MEYER, Inspector General
NAME OF REPORT: Ohio Department of Mental Health
FILE ID #: 2011-176
KEEPER OF RECORDS CERTIFICATION
This is a true and correct copy of the report which is required to be prepared
by the Office of the Ohio Inspector General pursuant to Section 121.42 of the
Ohio Revised Code.
Jill Jones
KEEPER OF RECORDS
CERTIFIED
June 24, 2013
Rhodes State Office Tower ◊ 30 East Broad Street – Suite 2940 ◊ Columbus, Ohio 43215-3414
Phone: 614-644-9110 ◊ FAX: 614-644-9504 ◊ Toll Free: 800-686-1525 ◊ Email: [email protected]
The Ohio Inspector General is on the World Wide Web at www.watchdog.ohio.gov
MAILING ADDRESS
OFFICE OF THE INSPECTOR GENERAL
JAMES A. RHODES STATE OFFICE TOWER
30 EAST BROAD STREET – SUITE 2940
COLUMBUS, OH 43215-3414
TELEPHONE
(614) 644-9110
IN STATE TOLL- FREE
(800) 686-1525
FAX
(614) 644-9504
E-MAIL
[email protected]
INTERNET
WATCHDOG.OHIO.GOV