NSA Employee Pleads Guilty To Stealing Classified Information

A former National Security Agency employee admitted on Friday 1st December, that he had illegally taken from the agency classified documents believed to have subsequently been stolen from his home computer by hackers working for Russian intelligence.

Nghia Pho, 67, has pleaded guilty to one count of willful retention of national defense information, an offense that carries a possible 10-year sentence. Prosecutors agreed not to seek more than eight years, however, and Mr. Pho’s attorney, Robert C. Bonsib, will be free to ask for a more lenient sentence. He remains free while awaiting sentencing on April 6.

Mr. Pho had been charged in secret, though some news reports had given a limited description of the case. Officials unsealed the charges on Friday, resolving the long-running mystery of the defendant’s identity.

Although the documents don't make it clear exactly what specific classified data and records were taken, beyond hard copy and digital files stored in Pho's residence, several earlier reports have pointed to hacking tools developed for offensive operations launched by the NSA, such as targeting foreign networks and systems for conducting surveillance.

Mr. Pho, who worked as a software developer for the NSA, was born in Vietnam but is a naturalised United States citizen. Prosecutors withheld from the public many details of his government work and of the criminal case against him, which is linked to a continuing investigation of Russian hacking. But in court documents, prosecutors did disclose that he worked from 2006 to 2016 for the NSA’s “Tailored Access Operations.” The unit, whose name has now been changed to Computer Network Operations, is the NSA’s fastest-growing component. 

Its hackers break into foreign computer networks to gather intelligence, often leaving behind software implants that continue to collect documents and other data and forward it to the agency for months or years.

Prosecutors said that from 2010 until March 2015, Mr. Pho began removing classified documents and writings. He kept those materials, some in digital form, at his home in Maryland, according to prosecutors. It appears he was charged in March 2015.

Mr. Pho is one of three NSA workers to be charged in the past two years with mishandling classified information, a dismal record for an agency that is responsible for some of the government’s most carefully guarded secrets.

The leaks have come to light as investigators scramble to trace the source of an even worse breach of NSA security: the public release of the agency’s hacking tools by a still-unidentified group calling itself the Shadow Brokers. Some of those tools have been subsequently used for “ransomware” attacks that shut down or disrupted businesses, hospitals, railways and other enterprises around the world this year.

Government officials, who would speak of the classified details of the case only on condition of anonymity, said that Mr. Pho took the classified documents home to help him rewrite his resume. 

But he had installed on his home computer antivirus software made by Kaspersky Lab, a top Russian software company, and Russian hackers are believed to have exploited the software to steal the documents, the officials said. It is not clear whether anyone at Kaspersky Lab was aware of the document theft. The company has acknowledged finding NSA hacking software on a customer’s computer and removing it, but says the material was subsequently destroyed. It has denied that it works with Russian intelligence.

The sensitivity of the case was evident on Friday, when one courtroom official described the charges against Mr. Pho as “super-sealed” before the hearing. The aggressive hacking of American targets by the Russian government, including the Democratic National Committee during last year’s election campaign, is a high-priority concern for the United States, and forensic information from Mr. Pho’s computer might provide useful clues.

In addition to Mr. Pho, an NSA contractor, Harold T. Martin III, was arrested last year after FBI agents found some 50 terabytes of data and documents that he had taken from the NSA and other agencies over 20 years. The material was stuffed into a garden shed and car, among other places, and investigators have considered the possibility that the Shadow Brokers might have obtained the hacking tools from Mr. Martin, who had also worked at one point for agency’s Tailored Access Operations.

A contract linguist who worked for the NSA in Georgia, Reality Winner, was arrested in June and charged with providing a single NSA document to the online publication The Intercept. Both Mr. Martin and Ms. Winner are being held awaiting trial.

New York Times:     ZDNet

You Might Also Read:

The US National Security Agency Is On The Ropes:

Russian Spies Used Kaspersky Anti-V To Hack NSA:

UK National Cyber Security Centre Has Not Certified Kaspersky:

We Are In A New Era Of Espionage:

Cyberspies: The Secret History of Surveillance, Hacking And Digital Espionage:

 


 

 

« Paying For The UK’s Cyber War With Russia
British Police Lose Phone & Web Search Powers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cloud Security Alliance (CSA)

Cloud Security Alliance (CSA)

The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing

Anomali

Anomali

Anomali delivers intelligence-driven cybersecurity solutions to enhance threat visibility, automate threat processing and detection, and accelerate threat investigation, response, and remediation.

Cobwebs Technologies

Cobwebs Technologies

Cobwebs Technologies provide web intelligence solutions for Law Enforcement (including cybercrime), Intelligence Agencies and Federal Agencies.

Sopra Steria

Sopra Steria

Sopra Steria is a leading European information technology consultancy.

Finnish Information Security Cluster (FISC)

Finnish Information Security Cluster (FISC)

FISC is an organization established by major Finnish information security companies to promote their activities nationally and internationally.

Protectimus

Protectimus

Affordable two factor authentication (2FA) provider. Protect your data from theft with multi factor authentication service from Protectimus.

Altron

Altron

Altron provides locally relevant innovative and integrated ICT solutions to business, government and consumers.

CERT-PH

CERT-PH

CERT-PH is the National Computer Emergency Response Team and the highest body for cybersecurity related activities in the Philippines.

GV

GV

GV provides venture capital funding to bold new companies in the fields of life science, healthcare, artificial intelligence, robotics, transportation, cyber security and agriculture.

Gray Analytics

Gray Analytics

Gray Analytics is a Cybersecurity Risk Management company providing best-practice services across a broad spectrum of cyber scenarios for both government and commercial customers.

Fortified Health Security

Fortified Health Security

Fortified’s team of cybersecurity specialists is dedicated to helping healthcare providers, payers and business associates protect their patient data across the Fortified Healthcare Ecosystem.

Space Hellas

Space Hellas

Space Hellas is a dynamic, established System Integrator and Value Added Solutions Provider, holding a leading position in the high technology arena.

Resillion

Resillion

Resillion (formerly Eurofins Digital Testing) is a global leader in quality engineering and cyber security services with operations in Europe, US, UK, India and China.

National Centre for Digital Security (CNSD) - Peru

National Centre for Digital Security (CNSD) - Peru

The National Center for Digital Security manages and supervises the operation of Digital Security in Peru in order to strengthen digital trust.

RapidFort

RapidFort

RapidFort’s Software Attack Surface Optimization Platform remediates 95% of software vulnerabilities in minutes without code changes.

NetDescribe

NetDescribe

NetDescribe, part of Xantaro Group, advises and supports companies in building secure and stable IT environments.