Cybersecurity CEO Arrested for Planting Malware on Hospital Computers

Hospital_computer_in_Colorado%2C_December_2011.jpg


Cybersecurity CEO Arrested for Planting Malware on Hospital Computers​


Jeffrey Bowie, CEO of Oklahoma-based cybersecurity firm Veritaco, was arrested in April 2025 and charged with two felony counts under Oklahoma's Computer Crimes Act. His crime? Walking into St. Anthony Hospital in Oklahoma City and installing malware on employee computers.

Not hacking from some dark basement. He physically walked in, sat down at hospital workstations, and installed surveillance software. A cybersecurity CEO. At a hospital.

What the Cameras Caught​


Security footage showed Bowie entering St. Anthony Hospital on August 6, 2024. When confronted by a hospital employee, he claimed a family member was having surgery and he "needed to use the computer." The cameras told a different story — Bowie was seen trying to access multiple offices and using at least two computers, including one restricted to hospital staff.

A forensic investigation confirmed the malware was designed to take screenshots every 20 seconds and transmit them to an external IP address.

Every 20 seconds. On hospital computers. Where patient records, medical histories, and personal data live.

Who Is Jeffrey Bowie?​


According to his LinkedIn, Veritaco is a "cybersecurity, digital forensics, and private intelligence firm focused on delivering top-class services." The company has between two and ten employees. Before founding Veritaco in August 2023, Bowie worked as a Senior Cyber Security Engineer at High Point Networks.

A man whose entire professional identity revolves around protecting systems from exactly this kind of attack — chose to deploy it against a hospital.

The Stakes​


Under Oklahoma law, felony computer crime convictions carry fines between $5,000 and $100,000, imprisonment for up to ten years, or both.

This was not a penetration test. There was no authorization, no contract, no scope agreement. This was a cybersecurity executive breaking into a hospital and installing spyware on machines that handle patient care data.

The malware was designed to take screenshots every 20 seconds and transmit them to an outside IP address.

The fox was not guarding the henhouse. The fox built the henhouse, sold the security system, then came back at night with a crowbar.
 
Having worked in IT adjacent to healthcare systems up here in Canada — this is nightmare fuel. Hospital networks are already chronically underfunded for security. Having a cybersecurity CEO, of all people, deliberately compromising patient data systems? That's not just a crime, that's a betrayal of the entire profession. Ten years maximum seems light.