Secret Arrest Of A National Security Agency Contractor

The FBI secretly arrested a former National Security Agency contractor in August and, according to law enforcement officials, is investigating whether he stole and disclosed highly classified computer code developed by the agency to hack into the networks of foreign governments.

The arrest raises the embarrassing prospect that for the second time in three years, a contractor for the consulting company Booz Allen Hamilton managed to steal highly damaging secret information while working for the NSA. In 2013, Edward Snowden, (pictures) who was also a Booz Allen contractor, took a vast trove of documents from the agency that were later passed to journalists, exposing surveillance programs in the United States and abroad.

The contractor was identified as Harold T. Martin of Glen Burnie, according to a criminal complaint filed in late August and unsealed recently. Mr. Martin, who at the time of his arrest was working as a contractor for the Defense Department after leaving the NSA, was charged with theft of government property and the unauthorised removal or retention of classified documents.

Martin, 51, was arrested during an FBI raid on his home on Aug. 27. A neighbor, Murray Bennett, said in a telephone interview that two dozen FBI agents wearing military-style uniforms and armed with long guns stormed the house, and later escorted Martin out in handcuffs.

According to court documents, the FBI. discovered thousands of pages of documents and dozens of computers or other electronic devices at his home and in his car, a large amount of it classified. The digital media contained “many terabytes of information,” according to the documents. They also discovered classified documents that had been posted online, including computer code, officials said. Some of the documents were produced in 2014.

But more than a month later, the authorities cannot say with certainty whether Mr. Martin leaked the information, passed them on to a third party or whether he simply downloaded them.

When FBI agents interviewed Mr. Martin after the raid, he initially denied having taken the documents and digital files, according to the complaint. But he later told the authorities that he knew he was not authorised to have the materials. He told the agents, according to the complaint, that “he knew what he had done was wrong and that he should not have done it because he knew it was unauthorised.”

The Justice Department unsealed the complaint, which was filed in United States District Court in Baltimore, after The New York Times notified the government it intended to publish a story about Mr. Martin.

In a brief statement, lawyers for Martin said: “We have not seen any evidence. But what we know is that Hal Martin loves his family and his country. There is no evidence that he intended to betray his country.”

If true, the allegations against Martin are a setback for the Obama administration, which has sustained a series of disclosures of classified information. 

Along with Mr. Snowden’s revelations, the anti-secrecy group WikiLeaks in 2010 disclosed hundreds of thousands of documents from the State and Defense Departments. In the aftermath of the Snowden disclosures, the administration took steps to put measures in place to prevent the unauthorised disclosures of classified information.

Josh Earnest, the White House press secretary, defended the Obama administration’s procedures for protecting national security information, arguing that since Mr. Snowden’s disclosures, agencies have tightened their security measures. He cited the creation of a task force that sets and monitors security requirements for agencies that handle classified information, and an overhaul of the government’s background check process, including adding more frequent updates.

The administration has also lowered the number of employees that have access to classified information, Mr. Earnest said, reducing it by 17 percent in the past couple of years.

“The president’s got a lot of confidence that the vast majority of people who serve this country in the national security arena, particularly our professionals in the intelligence community, are genuine American patriots,” Mr. Earnest said.

The information believed to have been stolen by Martin appears to be different in nature from Mr. Snowden’s theft, which included documents that described the depth and breadth of the NSA’s surveillance.

Martin is suspected of taking the highly classified computer code developed by the agency to break into computer systems of adversaries like Russia, China, Iran and North Korea, some of it outdated.

Mr. Martin, a Navy veteran, has degrees in economics and information systems and has been working for a decade on a Ph.D. in computer science. Neighbors described him as cordial and helpful but knew little about his work.

It is also problematic for Booz Allen, which has built much of its business on providing highly technical services to the NSA and other intelligence agencies. Booz Allen said in a statement, “we immediately reached out to the authorities to offer our total cooperation in their investigation, and we fired the employee. We continue to cooperate fully with the government on its investigation into this serious matter.”

NYT
 

« Yahoo Secretly Scanned Emails For US Intelligence
TalkTalk Penalised With A Record Fine »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Identity Theft Resource Center (ITRC)

Identity Theft Resource Center (ITRC)

ITRC is a non-profit organization established to empower and guide consumers, victims, business and government to minimize risk and mitigate the impact of identity compromise and crime.

IT Security Guru

IT Security Guru

IT Security Gurus publish daily breaking news. interviews with the key thinkers in IT security, videos and the top 10 stories as picked by our Editor.

Kaspersky Lab

Kaspersky Lab

Kaspersky Lab is one of the world’s largest privately held vendors of endpoint cybersecurity solutions.

Kaseya

Kaseya

Kaseya is a premier provider of unified IT management and security software for managed service providers (MSPs) and small to medium-sized businesses (SMBS).

ISACA Conferences

ISACA Conferences

ISACA is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in IT and Information Security.

CyberSec.sk (CSSk)

CyberSec.sk (CSSk)

CyberSec.sk is the Slovak portal bringing the latest cyber security news, politics, tips and instructions on how to protect the internet.

Security University

Security University

Security University is a leading provider of Qualified Hands-On Cybersecurity Education, Information Assurance Training and Certifications for IT and Security Professionals.

Accel

Accel

Accel is a leading venture capital firm that invests in people and their companies from the earliest days through all phases of private company growth. Areas of focus include cybersecurity.

StoneLock

StoneLock

StoneLock is a trusted leader in the design and manufacture of facial recognition software and technology.

Iterasec

Iterasec

Iterasec provides a full range of security services to hacker-proof your products and make software engineering process secure by design.

Rubrik

Rubrik

Rubrik helps enterprises achieve data control to drive business resiliency, cloud mobility, and regulatory compliance.

TWC IT Solutions

TWC IT Solutions

Since 2011, TWC IT Solutions has offered managed IT Support, Cybersecurity, Disaster Recovery, Contact Centre and Business Connectivity services to clients across 24 countries globally.

FusionAuth

FusionAuth

FusionAuth is the customer authentication and authorization platform that makes developers' lives awesome.

CyberForce Global

CyberForce Global

CyberForce Global are at the forefront of start-up technology recruitment in areas including cybersecurity, IT infrastructure, software, fintech, blockchain and more.

Bytium

Bytium

Bytium provides top-tier IT services and solutions designed to empower everyone, from individuals to global corporations. Specializing in cybersecurity and proactive IT management.

Element

Element

Element is a new type of communications platform. It combines consumer messaging apps, collaboration tools and video conferencing to replace email, address shadow IT and improve security.