NSA Employee Pleads Guilty To Stealing Classified Information

A former National Security Agency employee admitted on Friday 1st December, that he had illegally taken from the agency classified documents believed to have subsequently been stolen from his home computer by hackers working for Russian intelligence.

Nghia Pho, 67, has pleaded guilty to one count of willful retention of national defense information, an offense that carries a possible 10-year sentence. Prosecutors agreed not to seek more than eight years, however, and Mr. Pho’s attorney, Robert C. Bonsib, will be free to ask for a more lenient sentence. He remains free while awaiting sentencing on April 6.

Mr. Pho had been charged in secret, though some news reports had given a limited description of the case. Officials unsealed the charges on Friday, resolving the long-running mystery of the defendant’s identity.

Although the documents don't make it clear exactly what specific classified data and records were taken, beyond hard copy and digital files stored in Pho's residence, several earlier reports have pointed to hacking tools developed for offensive operations launched by the NSA, such as targeting foreign networks and systems for conducting surveillance.

Mr. Pho, who worked as a software developer for the NSA, was born in Vietnam but is a naturalised United States citizen. Prosecutors withheld from the public many details of his government work and of the criminal case against him, which is linked to a continuing investigation of Russian hacking. But in court documents, prosecutors did disclose that he worked from 2006 to 2016 for the NSA’s “Tailored Access Operations.” The unit, whose name has now been changed to Computer Network Operations, is the NSA’s fastest-growing component. 

Its hackers break into foreign computer networks to gather intelligence, often leaving behind software implants that continue to collect documents and other data and forward it to the agency for months or years.

Prosecutors said that from 2010 until March 2015, Mr. Pho began removing classified documents and writings. He kept those materials, some in digital form, at his home in Maryland, according to prosecutors. It appears he was charged in March 2015.

Mr. Pho is one of three NSA workers to be charged in the past two years with mishandling classified information, a dismal record for an agency that is responsible for some of the government’s most carefully guarded secrets.

The leaks have come to light as investigators scramble to trace the source of an even worse breach of NSA security: the public release of the agency’s hacking tools by a still-unidentified group calling itself the Shadow Brokers. Some of those tools have been subsequently used for “ransomware” attacks that shut down or disrupted businesses, hospitals, railways and other enterprises around the world this year.

Government officials, who would speak of the classified details of the case only on condition of anonymity, said that Mr. Pho took the classified documents home to help him rewrite his resume. 

But he had installed on his home computer antivirus software made by Kaspersky Lab, a top Russian software company, and Russian hackers are believed to have exploited the software to steal the documents, the officials said. It is not clear whether anyone at Kaspersky Lab was aware of the document theft. The company has acknowledged finding NSA hacking software on a customer’s computer and removing it, but says the material was subsequently destroyed. It has denied that it works with Russian intelligence.

The sensitivity of the case was evident on Friday, when one courtroom official described the charges against Mr. Pho as “super-sealed” before the hearing. The aggressive hacking of American targets by the Russian government, including the Democratic National Committee during last year’s election campaign, is a high-priority concern for the United States, and forensic information from Mr. Pho’s computer might provide useful clues.

In addition to Mr. Pho, an NSA contractor, Harold T. Martin III, was arrested last year after FBI agents found some 50 terabytes of data and documents that he had taken from the NSA and other agencies over 20 years. The material was stuffed into a garden shed and car, among other places, and investigators have considered the possibility that the Shadow Brokers might have obtained the hacking tools from Mr. Martin, who had also worked at one point for agency’s Tailored Access Operations.

A contract linguist who worked for the NSA in Georgia, Reality Winner, was arrested in June and charged with providing a single NSA document to the online publication The Intercept. Both Mr. Martin and Ms. Winner are being held awaiting trial.

New York Times:     ZDNet

You Might Also Read:

The US National Security Agency Is On The Ropes:

Russian Spies Used Kaspersky Anti-V To Hack NSA:

UK National Cyber Security Centre Has Not Certified Kaspersky:

We Are In A New Era Of Espionage:

Cyberspies: The Secret History of Surveillance, Hacking And Digital Espionage:

 


 

 

« Paying For The UK’s Cyber War With Russia
British Police Lose Phone & Web Search Powers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Computer & Communications Industry Association (CCIA)

Computer & Communications Industry Association (CCIA)

CCIA supports efforts to facilitate and streamline information sharing on cyber threats between the private sector and the Federal Government.

Lynxspring

Lynxspring

Lynxspring provides edge-to-enterprise solutions and IoT technology for intelligent buildings, energy management, equipment control and specialty machine-to-machine applications.

SecuGen

SecuGen

SecuGen is a leading provider of advanced, optical fingerprint recognition technology, products, tools and platforms for physical and information security.

Cybersecurity Collaborative

Cybersecurity Collaborative

CyberSecurity Collaborative is a forum for CISOs to share information that will collectively make us stronger, and better equipped to protect our enterprises from those seeking to damage them.

Cyber Security Austria (CSA)

Cyber Security Austria (CSA)

Cyber Security Austria (CSA) is an independent non-profit association with the aim to address security issues in the area of IT/cyber security of critical/strategic infrastructures in Austria.

T-REX

T-REX

T-REX is a coworking space, technology incubator, and entrepreneur resource center for technology startups.

Global Accelerator Network (GAN)

Global Accelerator Network (GAN)

Global Accelerator Network are a highly curated community of independent Accelerators, Partners and Investors.

Onevinn

Onevinn

Onevinn's goal is to create a transparent, cost-effective security that is noticed as little as possible by the users. We simply call it "intelligent security."

SAFECode

SAFECode

SAFECode is a global industry forum where business leaders and technical experts come together to exchange insights on creating, improving, and promoting effective software security programs.

X Technologies

X Technologies

X Technologies provide world-class engineering, information technology, information security, program management and repair services to Federal, State and commercial customers.

Tabidus Technology

Tabidus Technology

Tabidus Technology is a cybersecurity association that unites and provides the global protection options against cyber threats.

Scrut Automation

Scrut Automation

Scrut Automation's mission is to make compliance less painful and time consuming, so that businesses can focus on running their business.

NormCyber

NormCyber

NormCyber provide award-winning cyber security and data protection as a service for midsize organisations.

TetherView

TetherView

TetherView provides leading virtual desktop and email security technology to help businesses stand up and manage digital workspaces.

AKS iQ

AKS iQ

AKS iQ leads the RegTech sector with AI, automating regulatory compliance in the banking industry and ensuring paperless TBML and CFT adherence in finance.

SyberFort

SyberFort

SyberFort offers a suite of SAAS-based platforms designed to fortify your digital defenses including Threat Intelligence and Brand Protection.