Intelligence

Former NSA employee pleads guilty to attempted selling classified documents to Russia

A former NSA employee has pleaded guilty to charges of attempting to transmit classified defense information to Russia.

Jareh Sebastian Dalke (31), a former NSA employee has admitted to attempting to convey classified defense information to Russia, pleading guilty to the charges.

The man pleaded guilty today to six counts of attempting to transmit classified National Defense Information (NDI) to an agent of the Russian Federation (Russia).

Dalke served as an Information Systems Security Designer for the NSA from June 6, 2022, to July 1, 2022. The ex-NSA employee had Top Secret clearance that give him access to top secret documents.

“Dalke admitted that between August and September 2022, in order to demonstrate both his “legitimate access and willingness to share,” he used an encrypted email account to transmit excerpts of three classified documents to an individual he believed to be a Russian agent.” reads the press release published by DoJ. “In actuality, that person was an FBI online covert employee. All three documents from which the excerpts were taken contain NDI, are classified as Top Secret//Sensitive Compartmented Information (SCI) and were obtained by Dalke during his employment with the NSA.”

Dalke was deceived by an FBI agent who posed as a Russian spy looking for the classified documents.

Dalke demanded $85,000 for the document in his possession and he shared a sample of such documents with the FBI agent.

Then Dalke arranged to transfer additional classified documents to the fake Russian agent at Union Station in downtown Denver. The man used a laptop and followed the instructions provided by the FBI online covert employee to transfer five files. Four of the transferred files contained Top Secret NDI, the remaining one was a letter, which begins (in Russian and Cyrillic characters) “My friends!” and states, in part, “I am very happy to finally provide this information to you. . . . I look forward to our friendship and shared benefit. Please let me know if there are desired documents to find and I will try when I return to my main office.”

Dalke was arrested by the FBI on September 28, shortly after he transmitted the files.

The former NSA employee revealed he leaked the classified documents to injure the United States and to benefit Russia.

The sentencing is scheduled for April 26, 2024, Dalke faces a maximum penalty of up to life in prison.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Former NSA employee)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Evolve Bank data breach impacted fintech firms Wise and Affirm

Fintech firms Wise and Affirm confirmed they were both impacted by the recent data breach…

6 hours ago

Prudential Financial data breach impacted over 2.5 million individuals

Prudential Financial confirmed that more than 2.5 million individuals were affected by the data breach…

13 hours ago

Australian man charged for Evil Twin Wi-Fi attacks on domestic flights

An Australian man has been charged with carrying out 'Evil Twin' Wi-Fi attack during a…

15 hours ago

China-linked APT exploited Cisco NX-OS zero-day to deploy custom malware

Cisco fixed an actively exploited NX-OS zero-day, the flaw was exploited to install previously unknown…

16 hours ago

Critical unauthenticated remote code execution flaw in OpenSSH server

A critical flaw in the OpenSSH server can be exploited to achieve unauthenticated remote code…

1 day ago

Monti gang claims the hack of the Wayne Memorial Hospital in Pennsylvania

Wayne Memorial Hospital in Pennsylvania was the victim of a cyber attack, Monti gang claimed…

2 days ago

This website uses cookies.