Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Former CIA Officer Arrested for Disclosure of National Defense Information

The FBI reported that a former CIA officer was arrested today on charges that he illegally disclosed national defense information.

The FBI reported that a former CIA officer was arrested today on charges that he illegally disclosed national defense information.

Jeffrey Alexander Sterling, 43, of O’Fallon, Missouri, was charged in a 10-count indictment returned by a federal grand jury in the Eastern District of Virginia on Dec. 22, 2010, and unsealed today. According to the indictment, Sterling was employed by the CIA from May 1993 to January 2002. From November 1998 through May 2000, he was assigned to a classified operational program designed to conduct intelligence activities related to the weapons capabilities of certain countries, including an undisclosed country “Country A” which sources are saying is Iran.

“The indictment unsealed today alleges that Jeffrey Sterling violated his oath to protect classified information and then obstructed an investigation into his actions. Through his alleged actions, Sterling placed at risk our national security and the life of an individual working on a classified mission,” said Assistant Attorney General Lanny A. Breuer. “Those who violate the law, and the trust placed in them by the U.S. government to keep our national security information secure, must be held accountable.”

The indictment alleges that Sterling took a number of steps to facilitate the disclosure of the classified information, including:

• Stealing classified documents and other information from the CIA and unlawfully retaining those documents without the authority of the CIA

• Communicating by telephone, via e-mail and in person an author in order to arrange for the disclosure of or to disclose classified information to the author

• Meeting with an author in person to orally disclose classified information to the author and to provide documents containing classified information to the author for review or use

• Characterizing the classified information in a false and misleading manner as a means of inducing the author to write and publish a story premised on that false and misleading information

Advertisement. Scroll to continue reading.

• Deceiving and attempting to deceive the CIA into believing that he was a former employee adhering to his secrecy and non-disclosure agreements

• Deliberately choosing to disclose the classified information to a member of the media, knowing that such an individual would not reveal his identity, thereby concealing and perpetrating the scheme.

Michael Isikoff of NBC News covers the story on Alexander’s leaking of classified information on the secret U.S. effort to disrupt Iran’s nuclear program to New York Times reporter James Risen. The FBI Press Release announcing the indictment is also available. 

Related Reading:

• Man Pleads Guilty to Hacking Neighbor’s Wireless, Sending Threats against Vice President

• Mobile & Smart Device Security Survey 2010 – Concern Grows as Vulnerable Devices Proliferate

• Former Goldman Sachs Programmer Found Guilty After Stealing Computer Code

•  Mobile & Smart Device Security Survey 2010 – Concern Grows as Vulnerable Devices Proliferate 

 Chinese National Pleads Guilty to Stealing Ford Trade Secrets

• Akamai Employee Arrested, Accused of Trying to Sell Information to Foreign Government

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cybercrime

Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...