Saturday, February 22, 2025
Homecyber securityFormer FBI Analyst Sentenced for Keeping Hundreds of National Defense Documents

Former FBI Analyst Sentenced for Keeping Hundreds of National Defense Documents

Published on

SIEM as a Service

Follow Us on Google News

Former FBI Analyst sentenced for keeping hundreds of National Defense documents and other classified information.

According to the report published by the Department of Justice, Kendra Kingsbury, 50 who was a former FBI analyst was arrested and sentenced to 46 months in federal prison along with three years of supervised release. 

Kingsbury was convicted and pleaded guilty on October 30, 2022, for unlawfully retaining sensitive information relating to the FBI at her residence.

Kingsbury worked for the FBI from 2004 to December 15, 2017, under many different FBI squads relating to Illegal Drug Trafficking, Violent crime, and Counterintelligence.

Kingsbury had a top-level security clearance and had access to several sensitive information belonging to national defense and other classified information.

It also included presentation and training materials used by the FBI that are prohibited from being retained externally.

Kingsbury, Counterterrorism and Al Qaeda

During the investigation, she admitted that she had unlawfully removed data from the FBI and retained some information at her residence in Kansas.

This information includes details about the Intelligence sources and methods of the U.S. Government relating to counterterrorism, counterintelligence, and cyber threat defense.

In addition to this, she also retained some information relating to the human-source operation in national security investigations and other intelligence services on terrorist organizations and their technical capabilities.

The FBI has been tracing many terrorist organizations that are kept SECRET and classified.

This information also relates to Al Qaeda support members in the African continent and some suspects associated with Osama Bin Laden.

Kingsbury retained that information and stored it at her residence which is considered to be a violation according to the Espionage Act.

Further investigations revealed that she had many suspicious telephone records that are associated with the suspects in counterterrorism investigations.

Furthermore, there were also calls from those suspected individuals but Kingsbury did not reveal why she contacted them. Investigations are still going on for this case.

Looking For an All-in-One Multi-OS Patch Management Platform – .

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...