Information Released After FEMA Employees Were Discharged
In a stunning breach of trust and professional conduct, two employees at the Federal Emergency Management Agency (FEMA) have been fired following an internal investigation that uncovered explicit sexual communications with foreign nationals — and, in at least one case, access to “deviant pornography” from a facility designed to withstand nuclear war.
The probe, led by the Department of Homeland Security’s Insider Threat Operations Center, zeroed in on FEMA’s Mount Weather Emergency Operations Center in Bluemont, Virginia — a fortified, remote command facility intended to ensure national continuity during disasters, terror attacks, or nuclear strikes. Instead, investigators found two government employees exploiting its systems for shockingly inappropriate — and dangerous — activity.
One of the individuals, an IT Services Division employee with a top secret clearance, was caught using the agency’s unclassified network to engage in sexually explicit conversations with a foreign national believed to be in the Philippines. According to internal documents obtained by The Daily Caller, the messages were not isolated — they were part of a broader, habitual pattern.
PORN: Two career FEMA employees were fired after an investigation revealed they were watching beastiality porn at work. “These individuals had access to critical information and intelligence and were entrusted to safeguard Americans from emergencies—and instead they were… pic.twitter.com/R9DTYIZt4a
— @amuse (@amuse) September 3, 2025
Over a span of just nine days in August, the employee used Facebook Messenger to chat with the woman, referencing a possible visit to Manila and Cavite, and even making hotel searches while on duty. One message read: “I wish you were here sitting in my lap while I work.” Another noted, “I can’t bring my phone inside my workplace… Only chat here on FB Messenger while I’m working.” The implications here are staggering: an employee with access to sensitive government systems admitting, in real time, to online romantic liaisons with foreign individuals — and using government resources to do it.
The second employee, an Environmental Protection Specialist stationed in Alabama, was found to be accessing pornography and engaging in explicit online chats through FEMA’s systems. The content included sexually graphic exchanges and even the transmission of a pornographic image labeled deceptively as “work memes.” DHS sources later confirmed that some of the accessed material included content categorized as “deviant,” with one case reportedly involving bestiality.
This isn’t just about gross misconduct — though it certainly is that. It’s a matter of national security. Both individuals worked at Mount Weather, a core node in America’s emergency response infrastructure, where safeguarding classified systems and personnel integrity is critical. The idea that employees entrusted with protecting Americans during crises were instead surfing porn sites and sexting with overseas strangers is not just outrageous — it’s deeply alarming.
This episode also raises troubling questions about security clearance protocols, internal monitoring, and how these behaviors went undetected until now. According to User Activity Monitoring (UAM) records, at least one employee’s activity spanned multiple days and involved repeated, calculated steps to avoid detection — including leaving personal phones in cars while still using government networks for personal communications.
And while FEMA has taken corrective action, including the termination of both employees, the broader systemic implications remain. How did these individuals pass clearance? What safeguards failed? And how many more are slipping through the cracks?
