On the 17th of July Harold Martin will face 9 years of imprisonment following a long and complicated investigation regarding retention of national defense information.
Martin has been working in national security for more than 20 years and has served as a contractor of NSA from where he took details of computer infrastructure and classified operations, including 50 terabytes of government officers’ personal details, and “Top Secret” emails.
The investigation revealed that Martin could leak the data to the Shadow Brokers – the group who advertised NSA hacking tools online – after they gained a search warrant and accessed Harold’s Twitter account. Messages from his account would be sent just a few hours before the group posted them for sale.
While Martin was in custody the Shadow Brokers seemed to receive information from other sources, i.e. other contractors.
Although, the disclosure of the Shadow Brokers is not as relevant as security flaws which jeopardised the U.S. reputation.
The NSA is willing to enhance employee monitoring techniques, add policies to refine the hiring process and give supervisors more instruments to control the internal activity and communications.
SearchInform uses four types of cookies as described below. You can decide which categories of cookies you wish to accept to improve your experience on our website. To learn more about the cookies we use on our site, please read our Cookie Policy.
Always active. These cookies are essential to our website working effectively.
Cookies does not collect personal information. You can disable the cookie files
record
on the Internet Settings tab in your browser.
These cookies allow SearchInform to provide enhanced functionality and personalization, such as remembering the language you choose to interact with the website.
These cookies enable SearchInform to understand what information is the most valuable to you, so we can improve our services and website.
These cookies are created by other resources to allow our website to embed content from other websites, for example, images, ads, and text.
Please enable Functional Cookies
You have disabled the Functional Cookies.
To complete the form and get in touch with us, you need to enable Functional Cookies.
Otherwise the form cannot be sent to us.
Subscribe to our newsletter and receive a bright and useful tutorial Explaining Information Security in 4 steps!
Subscribe to our newsletter and receive case studies in comics!