Spyware case finally closed for teacher Julie Amero
Julie Amero was facing 40 years in prison
IDG News Service - The case against Julie Amero is finally closed.
On Friday, prosecutors reached a plea agreement with the former Connecticut schoolteacher who at one time faced up to 40 years in prison after being convicted of endangering minors. The charges stemmed from a 2004 incident in which a computer loaded with spyware displayed pornography to her students.
State prosecutors dropped four felony charges of "risk of injury to a minor" against her, with Amero pleading guilty to a disorderly conduct misdemeanor, according to the Hartford Courant.
A jury convicted Amero of the felony charges in January 2007, but the presiding judge in the case, Hillary Strackbein, set aside that verdict five months later, essentially granting Amero a new trial.
Amero will pay a $100 charge and have her Connecticut teaching credentials revoked, said Sunbelt Software Inc. CEO Alex Eckelberry, who led the team of computer investigators that analyzed the school's computer and concluded that Amero was innocent.
"The stress of this thing,… it just totally freaked her out," Eckelberry said Friday. "For four years, she's been sitting there with this thing hanging over her."
"It's disappointing that it wasn't dropped, but on the other hand I'm happy she got her life back," he added.
Amero had become a cause celebre to computer security professionals who argued that she was an innocent victim of spyware programs that took control of a poorly configured computer on Oct. 19, 2004, at Kelly Middle School in Norwich, Conn., where Amero had been a substitute teacher.
Prosecutors had argued that Amero, who was pregnant at the time of the incident, endangered students by not shutting off the computer after it began displaying pornographic images. Her supporters said she was an innocent victim of a spyware program.
Eckelberry said he had spoken with Amero late Friday.
"She was good," he said. "She was really, really happy."
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- 10 Things Your Next Firewall Must do Next-Generation Firewalls Defined
- Firewall Buyers Guide Operate as the core of your network security infrastructure
- Getting Started With a Zero Trust Approach to Network Security The Traditional Approach to Network Security is Failing. View Now>>
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts