Critical Compromise Of Air Force Communications Systems

0
10

A “critical compromise” of communications reportedly affected 17 US air force locations, and the Pentagon is investigating into it. The report includes proof that the same individual, who worked at Tennessee’s Arnold Air Force Base, may have compromised FBI communications.

According to the warrant, which alleged that the amount of pillaged equipment was worth nearly $90,000, the 48-year-old engineer had taken government radio technologies home, thereby stealing them for his use. The government had been informed by a base contractor that he had done this.

When law enforcement raided his home, they discovered that he had “unauthorized administrator access” to radio communications equipment used by the Air Education and Training Command (AETC)”affecting 17 DoD installations,” according to the search warrant. The Pentagon describes the AETC as one of nine “major commands,” which are “interrelated and complementary, providing offensive, defensive, and support elements” to Air Force HQ.

These fresh charges come just three months after another significant breach of Pentagon security, though the current government withheld details regarding the breadth or nature of information obtained. It was alleged in that event that Air National Guard member Jack Teixera revealed confidential information about the war in Ukraine on the social media site Discord. In June, Teixera entered a not-guilty plea, and the DoD made plans to improve its security measures to prevent similar breaches.

Forbes is refusing to publish the engineer’s name because no charges have been brought against him. When contacted for a comment, he remained silent. Requests for comment from the Air Force and the Department of Defense went unanswered. Justice Department officials opted not to comment.

Air Force engineer’s home raided 

According to Forbes, when the Air Force engineer’s home was raided, investigators discovered an open computer screen that showed the suspect was using radio programming software that “contained the entire Arnold Air Force Base communications system.”

Authorities also stated that they discovered evidence that the engineer had access to the FBI and Tennessee state agencies, but they remained mum over the nature of the potentially compromised information.

According to the media source, the engineer had a USB that included “administrative passwords and electronic system keys” for the AETC radio network, according to the warrant, which was disclosed in a document detailing the forensics on technology confiscated from the engineer’s house.

Flash drives containing “local law enforcement radio programming files” and “Motorola radio programming files,” both of which carried a warning banner indicating they were government property, were among the other things that were taken.

According to Source, installer files that the authorities found during the search opened with a “CONFIDENTIAL RESTRICTED” pop-up.

The warrant also stated how the investigators were informed by the witnesses and co-workers that the engineer allegedly “sold radios and radio equipment, worked odd hours, was arrogant, frequently lied, displayed inappropriate workplace behavior and sexual harassment, had financial problems, and possessed [Arnold air force base land mobile radio] equipment”.

LEAVE A REPLY

Please enter your comment!
Please enter your name here