FBI Arrested NSA Contractor For Walking Off With 'Highly Classified Information'
from the thought-this-kind-of-thing-was-supposed-to-be-impossible? dept
The Justice Department announced this morning that it had arrested Harold Martin, an NSA contractor (working for Booz Allen), for apparently copying "highly classified" material. The arrest actually happened at the end of August, but the details were only unsealed today.According to the affidavit, on August 27, 2016, search warrants were executed at Martin’s residence in Glen Burnie, including two storage sheds, as well as upon his vehicle and person. During execution of the warrants, investigators located hard copy documents and digital information stored on various devices and removable digital media. A large percentage of the materials recovered from Martin’s residence and vehicle bore markings indicating that they were property of the United States and contained highly classified information of the United States, including Top Secret and Sensitive Compartmented Information (SCI). In addition, investigators located property of the United States with an aggregate value in excess of $1,000, which Martin allegedly stole.The NY Times story about this claims that the information Martin had was "computer code." There's a lot of speculation on the Twitters that this is related to the infamous Shadow Brokers "leak" of NSA hacking tools. The dates don't fully line up. The Shadow Brokers leak involved code from 2013. The DOJ claims that the code it found Martin had is from 2014 -- though it's certainly possible that the investigation into Shadow Brokers led them to Martin (the arrest came the week after the Shadow Brokers info went public). However, the NY Times report does say that the info was for breaking into foreign computer systems:
The complaint alleges that among the classified documents found in the search were six classified documents obtained from sensitive intelligence and produced by a government agency in 2014. These documents were produced through sensitive government sources, methods, and capabilities, which are critical to a wide variety of national security issues. The disclosure of the documents would reveal those sensitive sources, methods, and capabilities.
The contractor arrested in recent weeks is suspected of taking the highly classified “source code” developed by the agency to break into computer systems of adversaries like Russia, China, Iran and North Korea. Two officials said that some of the information the contractor is suspected of taking was dated.As always, it will be interesting to hear the other side of this story. We've certainly seen the DOJ come down hard on former NSA employees and contractors, claiming they had made off with classified information, when the later details turned out to show a lot less. But this is clearly a story worth following...
It should also make you wonder just how many "controls" the NSA has really put in place to keep employees and contractors from walking off with highly classified information. We know that Snowden did it back in 2013, but the NSA keeps insisting that it's put in place more controls to stop it from happening again. And, if this truly is exploit code, this is much worse. Snowden made off with information about certain programs -- but not actual code.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: contractor, doj, exploits, fbi, harold martin, nsa, shadow brokers, surveilance
Companies: booz allen
Reader Comments
Subscribe: RSS
View by: Time | Thread
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Too bad
[ link to this | view in chronology ]
Honeypots
Along with honeypots to tempt the temptable. We can't discount that possibility, maybe they set him up. This is the spying game.
[ link to this | view in chronology ]
Re: Honeypots
[ link to this | view in chronology ]
Re: Re: Honeypots
But maybe it isn't, and maybe some of it is but the rest has subtle modifications acting as breadcrumbs if it gets into the wild. Just claim national security. Who's going to disagree?
[ link to this | view in chronology ]
[ link to this | view in chronology ]
My fantasy
That said, my fantasy is that this incident leaves them without any contractors willing to trust the NSA to let them work without false arrest of their employees.
Let it rot into obsolescence and disrepair in a shortage of labor and expertise.
[ link to this | view in chronology ]
Re: My fantasy
[ link to this | view in chronology ]
Re: Re: My fantasy
After NAFTA, TPP, etc., wipes out all the other jobs, what else can you do if you live in the rust belt?
These *are* the "good jobs" that HRC has been proposing.
[ link to this | view in chronology ]
Hey, ho! All together...
When the harbors are impacted with unemployed sailors, you know it's the dawn of interesting times.
Going on the account, I think they called it...
[ link to this | view in chronology ]
"However, the NY Times report does say that the info was for breaking into foreign computer systems."
Whew!!! I am so happy the programs can tell foreign computer systems from domestic computer systems. That's a relief.
[ link to this | view in chronology ]
Re:
http://whatismyipaddress.com/ip-lookup
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
And you do realize that the CIA and NSA has no problems recruiting, right? Mostly from Ivy's. If you are not that great a developer, they don't want you, because they pretty much have the pick of the crop.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Computer Code?
[ link to this | view in chronology ]
Newsworthy
[ link to this | view in chronology ]
[ link to this | view in chronology ]
What property did he steal?
He took a hammer and a toilet seat?
http://www.dailyprogress.com/news/a-toilet-seat-is-nothing/article_9174fbc6-0e7c-55a2-8760-a264 863320b2.html
Seriously, the way government seemingly assigns random values to assets, this could be anything from a POS ten-year-old netbook to a mothballed battleship.
[ link to this | view in chronology ]
Re: What property did he steal?
[ link to this | view in chronology ]
Retirement planning
[ link to this | view in chronology ]
The big question.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
OUR ROCK OR THE HARD PLACE
.
Please!... no emails!
[ link to this | view in chronology ]