Spyware case finally closed for teacher Julie Amero
Julie Amero was facing 40 years in prison
IDG News Service - The case against Julie Amero is finally closed.
On Friday, prosecutors reached a plea agreement with the former Connecticut schoolteacher who at one time faced up to 40 years in prison after being convicted of endangering minors. The charges stemmed from a 2004 incident in which a computer loaded with spyware displayed pornography to her students.
State prosecutors dropped four felony charges of "risk of injury to a minor" against her, with Amero pleading guilty to a disorderly conduct misdemeanor, according to the Hartford Courant.
A jury convicted Amero of the felony charges in January 2007, but the presiding judge in the case, Hillary Strackbein, set aside that verdict five months later, essentially granting Amero a new trial.
Amero will pay a $100 charge and have her Connecticut teaching credentials revoked, said Sunbelt Software Inc. CEO Alex Eckelberry, who led the team of computer investigators that analyzed the school's computer and concluded that Amero was innocent.
"The stress of this thing,… it just totally freaked her out," Eckelberry said Friday. "For four years, she's been sitting there with this thing hanging over her."
"It's disappointing that it wasn't dropped, but on the other hand I'm happy she got her life back," he added.
Amero had become a cause celebre to computer security professionals who argued that she was an innocent victim of spyware programs that took control of a poorly configured computer on Oct. 19, 2004, at Kelly Middle School in Norwich, Conn., where Amero had been a substitute teacher.
Prosecutors had argued that Amero, who was pregnant at the time of the incident, endangered students by not shutting off the computer after it began displaying pornographic images. Her supporters said she was an innocent victim of a spyware program.
Eckelberry said he had spoken with Amero late Friday.
"She was good," he said. "She was really, really happy."
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts