The U.S. Defense Intelligence Agency brings to justice their offender who leaked classified information to journalists.
The data was breached in 2018 and 2019, and the incident comprises several issues at once: personal reasons, third party, insider threat, breach to reporters.
A counterterrorism analyst, guilty of leaking sensitive data, began his work at the agency as a contractor in 2017.
He got a top secret clearance at the Defense Intelligence Agency turning a full-time staffer.
Allegedly, one of the journalists was personally involved with the DIA employee.
The reports taken by the violator were processed by the journalist while writing the compromising articles the link to which would later be retweeted by the agency worker.
He accessed documents unrelated to his professional tasks. There was also data about another country’s weapons systems taken and exposed.
It was revealed that the employee and the journalist were communicating via Twitter as the messages concerning the deal were discovered.
If he is charged for willful sharing of national defense information he will serve up to 10 years of sentence.
Messages via IM, and social networks, emails are the channels which require monitoring when it comes to confidential data, especially in case it concerns clients’ personal information, trade secrets or top secret government documents.
SearchInform uses four types of cookies as described below. You can decide which categories of cookies you wish to accept to improve your experience on our website. To learn more about the cookies we use on our site, please read our Cookie Policy.
Always active. These cookies are essential to our website working effectively.
Cookies does not collect personal information. You can disable the cookie files
record
on the Internet Settings tab in your browser.
These cookies allow SearchInform to provide enhanced functionality and personalization, such as remembering the language you choose to interact with the website.
These cookies enable SearchInform to understand what information is the most valuable to you, so we can improve our services and website.
These cookies are created by other resources to allow our website to embed content from other websites, for example, images, ads, and text.
Please enable Functional Cookies
You have disabled the Functional Cookies.
To complete the form and get in touch with us, you need to enable Functional Cookies.
Otherwise the form cannot be sent to us.
Subscribe to our newsletter and receive a bright and useful tutorial Explaining Information Security in 4 steps!
Subscribe to our newsletter and receive case studies in comics!