Saturday, February 8, 2025
HomeCyber Security NewsEx-CIA Analyst Pleaded Guilty For Leaking Top Secret National Defense Information

Ex-CIA Analyst Pleaded Guilty For Leaking Top Secret National Defense Information

Published on

SIEM as a Service

Follow Us on Google News

A former CIA analyst, Asif William Rahman, has pleaded guilty to charges of retaining and transmitting Top Secret National Defense Information to unauthorized recipients.

This alarming breach of national security came to light after classified information was publicly posted on social media platforms in October 2024.

Background of the Case

Rahman, 34, a resident of Vienna, Virginia, had been employed by the CIA since 2016 and held a Top Secret security clearance, granting him access to Sensitive Compartmented Information (SCI).

According to court documents, Rahman’s illegal actions began in the spring of 2024 and continued until his arrest in November 2024.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

On October 17, 2024, Rahman accessed and printed two Top Secret documents that contained sensitive information regarding a U.S. foreign ally and its strategies against a foreign adversary.

Within 24 hours, these documents appeared on social media, complete with their classification markings.

According to the US Govt report, Assistant Attorney General Matthew G. Olsen emphasized the severity of Rahman’s betrayal, stating, “Mr. Rahman betrayed the trust of the American people by unlawfully sharing classified national defense information.”

He assured the public that the Justice Department is committed to prosecuting those who compromise national security.

U.S. Attorney Jessica D. Aber for the Eastern District of Virginia highlighted that Rahman’s actions not only endangered lives but also jeopardized U.S. foreign relations and intelligence operations.

Robert Wells, Executive Assistant Director of the FBI’s National Security Branch, reiterated the importance of safeguarding classified information.

“Government employees who are granted security clearances must promise to protect it,” he said, adding that Rahman’s violations posed significant risks to national security.

Details of the Breach

In addition to leaking sensitive information, Rahman attempted to cover up his actions by deleting and editing journal entries on his devices.

He destroyed various electronic devices used in the transmission of the classified data, discarding them in public trash bins to evade investigation.

Rahman was indicted by a grand jury on November 7, 2024, and arrested by the FBI five days later. He remains in custody while awaiting sentencing.

Rahman has pleaded guilty to two counts of willful retention and transmission of classified information.

He faces a maximum penalty of 10 years in prison, with a sentencing date set for May 15, 2025.

The case is being prosecuted by Assistant U.S. Attorney Troy A. Edwards Jr. and Trial Attorney Brett Reynolds from the National Security Division’s Counterintelligence and Export Control Section.

The FBI Washington Field Office continues to investigate the case, underscoring the agency’s commitment to address breaches of national security with appropriate seriousness and urgency.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...

Hackers Leveraging Image & Video Attachments to Deliver Malware

Cybercriminals are increasingly exploiting image and video files to deliver malware, leveraging advanced techniques...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...