NSA Employee Pleads Guilty To Stealing Classified Information

A former National Security Agency employee admitted on Friday 1st December, that he had illegally taken from the agency classified documents believed to have subsequently been stolen from his home computer by hackers working for Russian intelligence.

Nghia Pho, 67, has pleaded guilty to one count of willful retention of national defense information, an offense that carries a possible 10-year sentence. Prosecutors agreed not to seek more than eight years, however, and Mr. Pho’s attorney, Robert C. Bonsib, will be free to ask for a more lenient sentence. He remains free while awaiting sentencing on April 6.

Mr. Pho had been charged in secret, though some news reports had given a limited description of the case. Officials unsealed the charges on Friday, resolving the long-running mystery of the defendant’s identity.

Although the documents don't make it clear exactly what specific classified data and records were taken, beyond hard copy and digital files stored in Pho's residence, several earlier reports have pointed to hacking tools developed for offensive operations launched by the NSA, such as targeting foreign networks and systems for conducting surveillance.

Mr. Pho, who worked as a software developer for the NSA, was born in Vietnam but is a naturalised United States citizen. Prosecutors withheld from the public many details of his government work and of the criminal case against him, which is linked to a continuing investigation of Russian hacking. But in court documents, prosecutors did disclose that he worked from 2006 to 2016 for the NSA’s “Tailored Access Operations.” The unit, whose name has now been changed to Computer Network Operations, is the NSA’s fastest-growing component. 

Its hackers break into foreign computer networks to gather intelligence, often leaving behind software implants that continue to collect documents and other data and forward it to the agency for months or years.

Prosecutors said that from 2010 until March 2015, Mr. Pho began removing classified documents and writings. He kept those materials, some in digital form, at his home in Maryland, according to prosecutors. It appears he was charged in March 2015.

Mr. Pho is one of three NSA workers to be charged in the past two years with mishandling classified information, a dismal record for an agency that is responsible for some of the government’s most carefully guarded secrets.

The leaks have come to light as investigators scramble to trace the source of an even worse breach of NSA security: the public release of the agency’s hacking tools by a still-unidentified group calling itself the Shadow Brokers. Some of those tools have been subsequently used for “ransomware” attacks that shut down or disrupted businesses, hospitals, railways and other enterprises around the world this year.

Government officials, who would speak of the classified details of the case only on condition of anonymity, said that Mr. Pho took the classified documents home to help him rewrite his resume. 

But he had installed on his home computer antivirus software made by Kaspersky Lab, a top Russian software company, and Russian hackers are believed to have exploited the software to steal the documents, the officials said. It is not clear whether anyone at Kaspersky Lab was aware of the document theft. The company has acknowledged finding NSA hacking software on a customer’s computer and removing it, but says the material was subsequently destroyed. It has denied that it works with Russian intelligence.

The sensitivity of the case was evident on Friday, when one courtroom official described the charges against Mr. Pho as “super-sealed” before the hearing. The aggressive hacking of American targets by the Russian government, including the Democratic National Committee during last year’s election campaign, is a high-priority concern for the United States, and forensic information from Mr. Pho’s computer might provide useful clues.

In addition to Mr. Pho, an NSA contractor, Harold T. Martin III, was arrested last year after FBI agents found some 50 terabytes of data and documents that he had taken from the NSA and other agencies over 20 years. The material was stuffed into a garden shed and car, among other places, and investigators have considered the possibility that the Shadow Brokers might have obtained the hacking tools from Mr. Martin, who had also worked at one point for agency’s Tailored Access Operations.

A contract linguist who worked for the NSA in Georgia, Reality Winner, was arrested in June and charged with providing a single NSA document to the online publication The Intercept. Both Mr. Martin and Ms. Winner are being held awaiting trial.

New York Times:     ZDNet

You Might Also Read:

The US National Security Agency Is On The Ropes:

Russian Spies Used Kaspersky Anti-V To Hack NSA:

UK National Cyber Security Centre Has Not Certified Kaspersky:

We Are In A New Era Of Espionage:

Cyberspies: The Secret History of Surveillance, Hacking And Digital Espionage:

 


 

 

« Paying For The UK’s Cyber War With Russia
British Police Lose Phone & Web Search Powers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Inspired eLearning

Inspired eLearning

Inspired eLearning deliver solutions that help clients nurture and enhance workforce skills, protect themselves against cyberattacks and regulatory violations.

Lanner Electronics

Lanner Electronics

Lanner Electronics is a leading hardware provider for advanced network appliances and industrial automation solutions including cyber security.

Early Warning Services

Early Warning Services

Early Warning Services identity, authentication and payment solutions empower financial institutions to make confident decisions, enable payments and mitigate fraud.

PrivateCore

PrivateCore

We protect data-in-use from hackers trying to steal data such as encryption keys, certificates, intellectual property.

Aveshka

Aveshka

Aveshka is a professional services firm focused on addressing complex threats and challenges including Cybersecurity and Information Technology.

Infosec (T) Ltd

Infosec (T) Ltd

Infosec (T) Limited is an independent Tanzania based consultancy specializing in IT governance, information security and IT audit.

Vector Informatik

Vector Informatik

Vector Informatik is a specialist in automotove electronics and provides services, embedded software and tools for securing embedded systems against cyber-attacks.

Andreessen Horowitz (a16z)

Andreessen Horowitz (a16z)

Andreessen Horowitz (known as "a16z") is a venture capital firm in Silicon Valley, California that backs bold entrepreneurs building the future through technology.

36 Group

36 Group

36 Group's criminal law team, has the experience and specialist knowledge to conduct effectively trials heavily concerned with the growing phenomenon of Cybercrime.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

SignalSEC

SignalSEC

SignalSEC provides vulnerability intelligence, malware analysis, penetration testing and associated training services.

ClearVector

ClearVector

ClearVector is a leading provider of realtime, identity-driven security for the cloud.

Intigriti

Intigriti

Intigriti helps companies protect themselves from cybercrime. Our community of ethical hackers provides continuous, realistic security testing to protect our customer’s assets and brand.

NorthRow

NorthRow

NorthRow provides digital transformation compliance solutions to help businesses manage regulatory and financial crime risks.

JanBask Training

JanBask Training

JanBask Training is a dynamic, highly professional, global online training provider committed to propelling the next generation of technology learners with a whole new way of training experience.

PixelQA

PixelQA

Are you looking for a security testing company to cross-check whether your software or mobile app has a possible security threat or not?