Post Profile






After latest NSA breach, does agency do enough to protect classified data?

The arrest of a National Security Agency contractor accused of stealing classified information represents the second known case of a government contractor being publicly accused of removing secret data from the intelligence agency since 2013. Continue reading ? The post After latest NSA breach, does agency do enough to protect classified data? appeared first on PBS NewsHour.
read more

share

Related Posts


Federal contractor arrested for taking classified information

News : The Rundown News Blog

WASHINGTON — A contractor for the National Security Agency has been arrested on charges that he illegally removed highly classified information and stored the material in his house and car, federal prosecutors announced Wednesday. C...

The FBI Has Arrested an NSA Contractor for Allegedly Stealing Classified Material

News / Independent News : Mother Jones

The FBI has arrested Harold Thomas Martin III, a contractor at the National Security Agency, for stealing "highly classified information," according to a Department of Justice statement released on Wednesday. News of an arrest was f...

NSA Contractor Arrested, Charged With Stealing National Secrets

News : Mediaite

The FBI has arrested a Maryland man and is investigating him for potentially stealing highly-classified information from the National Security Agency (NSA).

NSA contractor arrest highlights challenge of insider threat

Politics / US Politics : Washington Watch

The arrest of a National Security Agency contractor for allegedly stealing classified information was the second known case of a government contractor being publicly accused of removing secret data from … Click to Continue »

NSA contractor charged with stealing secret data — but agency denies ‘Snowden-type situation’

News : The Raw Story

The FBI has arrested a National Security Agency contractor on charges of stealing highly classified information and is investigating possible links to a recent leak of secret hacking tools used to break into the computers of adversa...

Comments


Copyright © 2016 Regator, LLC