Wednesday, January 15, 2025
Homecyber securityCommand Senior Chief Convicted For Setting Up Wi-Fi On US Navy Combat...

Command Senior Chief Convicted For Setting Up Wi-Fi On US Navy Combat Ship

Published on

 The former command senior chief of the littoral combat ship Manchester’s gold crew, Senior Chief Grisel Marrero, has been convicted at a court-martial for installing an unauthorized Wi-Fi system aboard the ship and subsequently lying about it to her superiors.

The conviction, which took place in March, has raised significant concerns about operational security and the integrity of leadership within the Navy.

Unauthorized Wi-Fi Installation

According to records obtained by Navy Times, Marrero, who has a background in Navy intelligence, willfully coordinated the procurement, installation, and use of an unauthorized and unapproved Wi-Fi system onboard the Manchester between March 2023 and August 2023.

Such systems are generally banned aboard Navy ships due to cybersecurity concerns.

Her actions were deemed a willful dereliction of duty, as she failed to safeguard the ship against operational security risks.

With ANYRUN You can Analyze any URL, Files & Email for Malicious Activity : Start your Analysis

Before her trial, Naval Surface Force Pacific (SURFPAC) quietly relieved Marrero from her leadership position aboard the Manchester in September due to a “loss of confidence.”

SURFPAC officials have declined to discuss the case in further detail. Marrero, who declined to comment for this report, was sentenced to a rank reduction to E-7 in March.

Marrero’s case was not the only high-level relief aboard Manchester’s gold crew last year.

In May 2023, the Navy also ousted the second-in-command of the ship’s gold crew, Cmdr. Matthew Yokeley.

SURFPAC has stated that Marrero’s and Yokeley’s reliefs were not related but declined to provide further details regarding the reasons for Yokeley’s ouster.

Court-Martial and Guilty Pleas

At a special court-martial earlier this year, Marrero pleaded guilty to willful dereliction of duty charge specifications.

She also pleaded guilty to two false official statement charge specifications, which involved her telling the commanding officer that there was no Wi-Fi aboard the Manchester.

Marrero pleaded not guilty to an obstruction of justice charge but was found guilty at trial.

This charge involved an incident near Naval Base Guam in August 2023, where Marrero altered a data usage image on a chief’s mess Starlink account to reflect less data usage.

She did this to “influence or impede” pending criminal or disciplinary actions against another Navy member.

Additional Disciplinary Actions

SURFPAC spokesman Cmdr. Arlo Abrahamson told Navy Times that other sailors were also disciplined regarding the unauthorized Wi-Fi, but he declined to provide further details.

Marrero is currently assigned to the Naval Surface Forces.

The Manchester was in or around San Diego, Hawaii, and Guam at the time of Marrero’s crimes.

This case highlights the critical importance of adhering to cybersecurity protocols and maintaining the integrity of Navy leadership.

The unauthorized installation of Wi-Fi systems poses significant risks to operational security, and the Navy’s response underscores its commitment to addressing such breaches.

Looking for Full Data Breach Protection? Try Cynet's All-in-One Cybersecurity Platform for MSPs: Try Free Demo 

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Aembit Announces Speaker Lineup for the Inaugural NHIcon

Aembit, the non-human identity and access management (IAM) company, unveiled the full agenda for...

Sweet Security Introduces Patent-Pending LLM-Powered Detection Engine, Reducing Cloud Detection Noise to 0.04%

Sweet Security, a leader in cloud runtime detection and response, today announced the launch...

ShadowSyndicate Hackers Added RansomHub Ransomware to their Arsenal

ShadowSyndicate is a prolific threat actor that has been active since July 2022, collaborated...

5,000 WordPress Sites Hacked in New WP3.XYZ Malware Attack

Widespread malware campaigns detected by side crawlers exploit vulnerabilities on multiple websites where the...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

ShadowSyndicate Hackers Added RansomHub Ransomware to their Arsenal

ShadowSyndicate is a prolific threat actor that has been active since July 2022, collaborated...

5,000 WordPress Sites Hacked in New WP3.XYZ Malware Attack

Widespread malware campaigns detected by side crawlers exploit vulnerabilities on multiple websites where the...

Hackers Exploiting Fortinet Zero-day Vulnerability In Wild To Gain Super-Admin Privileges

A critical zero-day vulnerability in Fortinet's FortiOS and FortiProxy products is being actively exploited...