![]() ![]() The outlet also reported that, according to the warrant, a document detailing the forensics on technologies seized from the engineer’s home revealed that he had a USB which contained “administrative passwords and electronic system keys” for the AETC radio network. According to the warrant, the software “contained the entire Arnold air force base (AAFB) communications system”, Forbes reported. Meanwhile, installer files recovered in the search came with a "CONFIDENTIAL RESTRICTED" pop-up when opened.Investigators also found an open computer screen that showed the engineer running a Motorola radio programming software. Also retrieved from flash drives were “local law enforcement radio programming files,” On another USB drive were “Motorola radio programming files,” which, when opened, presented a warning banner noting they were U.S. He claims to have carried out numerous tests of the Arnold Air Force Base’s security, improved protection of radio communications on the site and had knowledge of the encryption used on government data.Ī document detailing the forensics on technologies seized from his home revealed that he had a USB containing “administrative passwords and electronic system keys” for the AETC radio network. The FBI hadn’t provided comment at the time of publication, though the search warrant revealed it was working with the Air Force on the investigation.Īccording to the warrant, “witnesses and co-workers” told investigators that the suspect “sold radios and radio equipment, worked odd hours, was arrogant, frequently lied, displayed inappropriate workplace behavior and sexual harassment, had financial problems, and possessed equipment.” A colleague had twice reported him because of “insider threat indicators” and unauthorized possession of Air Force equipment, investigators said.Īccording to his LinkedIn page, the suspect has a long history in cybersecurity as well as radio communications. They also claimed to have found evidence the suspect had possible access to communications of the FBI and various Tennessee state agencies, though authorities did not provide more information on what data he had obtained. There are no active security concerns.”ĭuring the raid, investigators also discovered an open computer screen showing the suspect was running a Motorola radio programming software, “which contained the entire Arnold Air Force Base (AAFB) communications system,” according to the warrant. The Justice Department declined to comment.Īfter publication, a spokesperson for the Arnold Engineering Development Complex, for whom the suspect worked, confirmed the Air Force Office of Special Investigation was supporting the investigation, led by the United States Attorney for the Eastern District of Tennessee.Īn Air Force spokesperson added that, “the Air Force took immediate action in February to mitigate any potential compromise and safeguard our networks. The Department of Defense had not responded to a request for comment. ![]() He did not respond to requests for comment. Because the engineer has not been charged, Forbes is withholding publication of his name.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |