Ex-EPA Employee Allegedly Made Up CIA Employment to Get Out of Work

A former executive at the Environmental Protection Agency used a series of lies and embellishments to defraud the government out of nearly $900,000, according to The Washington Post.

John C. Beale allegedly told his bosses he was away from his job in order to conduct “sensitive work for another agency,” and after 12 years racked up $880,000 in pay and bonuses he did not earn. Beale, who was a senior policy adviser in the Office of Air and Radiation, is expected to plead guilty at a hearing Monday in U.S. District Court for the District of Columbia, the Post reported.

The former EPA employee reportedly told co-workers he was traveling to China, South Africa and England, and said he had contracted malaria. Beale allegedly told his supervisors he was working for the CIA while taking time away from the office.

Beale worked under Gina McCarthy, who has since gone on to become EPA administrator. McCarthy said she turned him over to authorities as soon as she discovered the scam, and forced him to retire in April 2013.

The former policy adviser received a salary -- $164,700 when he resigned -- benefits and retention incentive bonuses that he had not earned, the U.S. Attorney’s Office alleged. The Post learned of the charges from a “criminal information” report, which is only filed with the defendant’s cooperation and typically means a plea agreement has been reached.

The U.S. Attorney’s Office is seeking $507,207 in restitution.

Beale’s wife, Nancy Kete, also spent a stint working for the EPA, but charges describe Beale as working alone in operating his scheme. 

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.