Monday, May 5, 2025
HomeCyber Security NewsEx-CIA Analyst Pleaded Guilty For Leaking Top Secret National Defense Information

Ex-CIA Analyst Pleaded Guilty For Leaking Top Secret National Defense Information

Published on

SIEM as a Service

Follow Us on Google News

A former CIA analyst, Asif William Rahman, has pleaded guilty to charges of retaining and transmitting Top Secret National Defense Information to unauthorized recipients.

This alarming breach of national security came to light after classified information was publicly posted on social media platforms in October 2024.

Background of the Case

Rahman, 34, a resident of Vienna, Virginia, had been employed by the CIA since 2016 and held a Top Secret security clearance, granting him access to Sensitive Compartmented Information (SCI).

- Advertisement - Google News

According to court documents, Rahman’s illegal actions began in the spring of 2024 and continued until his arrest in November 2024.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

On October 17, 2024, Rahman accessed and printed two Top Secret documents that contained sensitive information regarding a U.S. foreign ally and its strategies against a foreign adversary.

Within 24 hours, these documents appeared on social media, complete with their classification markings.

According to the US Govt report, Assistant Attorney General Matthew G. Olsen emphasized the severity of Rahman’s betrayal, stating, “Mr. Rahman betrayed the trust of the American people by unlawfully sharing classified national defense information.”

He assured the public that the Justice Department is committed to prosecuting those who compromise national security.

U.S. Attorney Jessica D. Aber for the Eastern District of Virginia highlighted that Rahman’s actions not only endangered lives but also jeopardized U.S. foreign relations and intelligence operations.

Robert Wells, Executive Assistant Director of the FBI’s National Security Branch, reiterated the importance of safeguarding classified information.

“Government employees who are granted security clearances must promise to protect it,” he said, adding that Rahman’s violations posed significant risks to national security.

Details of the Breach

In addition to leaking sensitive information, Rahman attempted to cover up his actions by deleting and editing journal entries on his devices.

He destroyed various electronic devices used in the transmission of the classified data, discarding them in public trash bins to evade investigation.

Rahman was indicted by a grand jury on November 7, 2024, and arrested by the FBI five days later. He remains in custody while awaiting sentencing.

Rahman has pleaded guilty to two counts of willful retention and transmission of classified information.

He faces a maximum penalty of 10 years in prison, with a sentencing date set for May 15, 2025.

The case is being prosecuted by Assistant U.S. Attorney Troy A. Edwards Jr. and Trial Attorney Brett Reynolds from the National Security Division’s Counterintelligence and Export Control Section.

The FBI Washington Field Office continues to investigate the case, underscoring the agency’s commitment to address breaches of national security with appropriate seriousness and urgency.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Claude AI Abused in Influence-as-a-Service Operations and Campaigns

Claude AI, developed by Anthropic, has been exploited by malicious actors in a range...

Threat Actors Attacking U.S. Citizens Via Social Engineering Attack

As Tax Day on April 15 approaches, a alarming cybersecurity threat has emerged targeting...

TerraStealer Strikes: Browser Credential & Sensitive‑Data Heists on the Rise

Insikt Group has uncovered two new malware families, TerraStealerV2 and TerraLogger, attributed to the...

MintsLoader Malware Uses Sandbox and Virtual Machine Evasion Techniques

MintsLoader, a malicious loader first observed in 2024, has emerged as a formidable tool...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Claude AI Abused in Influence-as-a-Service Operations and Campaigns

Claude AI, developed by Anthropic, has been exploited by malicious actors in a range...

Threat Actors Attacking U.S. Citizens Via Social Engineering Attack

As Tax Day on April 15 approaches, a alarming cybersecurity threat has emerged targeting...

TerraStealer Strikes: Browser Credential & Sensitive‑Data Heists on the Rise

Insikt Group has uncovered two new malware families, TerraStealerV2 and TerraLogger, attributed to the...