Monday, April 7, 2025
Homecyber securityFormer FBI Analyst Sentenced for Keeping Hundreds of National Defense Documents

Former FBI Analyst Sentenced for Keeping Hundreds of National Defense Documents

Published on

SIEM as a Service

Follow Us on Google News

Former FBI Analyst sentenced for keeping hundreds of National Defense documents and other classified information.

According to the report published by the Department of Justice, Kendra Kingsbury, 50 who was a former FBI analyst was arrested and sentenced to 46 months in federal prison along with three years of supervised release. 

Kingsbury was convicted and pleaded guilty on October 30, 2022, for unlawfully retaining sensitive information relating to the FBI at her residence.

- Advertisement - Google News

Kingsbury worked for the FBI from 2004 to December 15, 2017, under many different FBI squads relating to Illegal Drug Trafficking, Violent crime, and Counterintelligence.

Kingsbury had a top-level security clearance and had access to several sensitive information belonging to national defense and other classified information.

It also included presentation and training materials used by the FBI that are prohibited from being retained externally.

Kingsbury, Counterterrorism and Al Qaeda

During the investigation, she admitted that she had unlawfully removed data from the FBI and retained some information at her residence in Kansas.

This information includes details about the Intelligence sources and methods of the U.S. Government relating to counterterrorism, counterintelligence, and cyber threat defense.

In addition to this, she also retained some information relating to the human-source operation in national security investigations and other intelligence services on terrorist organizations and their technical capabilities.

The FBI has been tracing many terrorist organizations that are kept SECRET and classified.

This information also relates to Al Qaeda support members in the African continent and some suspects associated with Osama Bin Laden.

Kingsbury retained that information and stored it at her residence which is considered to be a violation according to the Espionage Act.

Further investigations revealed that she had many suspicious telephone records that are associated with the suspects in counterterrorism investigations.

Furthermore, there were also calls from those suspected individuals but Kingsbury did not reveal why she contacted them. Investigations are still going on for this case.

Looking For an All-in-One Multi-OS Patch Management Platform – .

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Exploit Fake CAPTCHAs and Cloudflare Turnstile to Distribute LegionLoader

In a sophisticated attack targeting individuals searching for PDF documents online, cybercriminals are using...

HellCat, Rey, and Grep Groups Dispute Claims in Orange and HighWire Press Cases

SuspectFile.com has uncovered a complex web of overlapping claims and accusations within the cybercrime...

AI Surpasses Elite Red Teams in Crafting Effective Spear Phishing Attacks

In a groundbreaking development in the field of cybersecurity, AI has reached a pivotal...

Threat Actors Use Windows Screensaver Files as Malware Delivery Method

Cybersecurity experts at Symantec have uncovered a sophisticated phishing campaign targeting various sectors across...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Threat Actors Exploit Fake CAPTCHAs and Cloudflare Turnstile to Distribute LegionLoader

In a sophisticated attack targeting individuals searching for PDF documents online, cybercriminals are using...

HellCat, Rey, and Grep Groups Dispute Claims in Orange and HighWire Press Cases

SuspectFile.com has uncovered a complex web of overlapping claims and accusations within the cybercrime...

AI Surpasses Elite Red Teams in Crafting Effective Spear Phishing Attacks

In a groundbreaking development in the field of cybersecurity, AI has reached a pivotal...