Harold Martin III was arrested August 27 in Maryland and poses a "grave danger" to the United States, prosecutors wrote in a filing ahead of a detention hearing set for Friday in Baltimore.

Martin, who has now been fired, worked for Booz Allen Hamilton -- the same firm that hired the NSA whistleblower Edward Snowden.

Martin was entrusted to work with classified information for several government agencies and allegedly had been stealing information since 1996.

"The defendant violated that trust by engaging in wholesale theft of classified government documents and property -- a course of felonious conduct that is breathtaking in its longevity and scale," prosecutors wrote.

They said Martin had swiped at least 50,000 gigabytes of information, though not all of it was classified. 

One single gigabyte is enough space to store about 10,000 pages of documents containing images and text.

"The defendant was in possession of an astonishing quantity of marked classified documents which he was not entitled to possess, including many marked (secret)," prosecutors said.

Some of the documents "appear" to contain national defense information and Martin allegedly kept the files in his car and lying around his Maryland home. 

Investigators also allegedly found an "arsenal" of 10 firearms including an assault rifle.

"The government anticipates that the charges will include violations of the Espionage Act, an offense that carries significantly higher statutory penalties and advisory guideline ranges than the charges listed in the complaint," prosecutors wrote.

Martin's lawyers have previously said he loves his family, and said there was no evidence he intended to betray his country.

Martin does not appear to have a valid passport and investigators have not said he sent information to foreign governments. 

But prosecutors noted: "The defendant has also communicated online with others in languages other than English, including in Russian."

Booz Allen has said it reached out to offer full cooperation with the authorities as soon as it learned of the arrest, and quickly fired Martin.

The arrest came after investigators began looking into the theft of source code used by the NSA to hack adversaries' computer systems, such as those of Russia, China, Iran and North Korea.

Such access would enable the NSA to plant malware in rivals' systems and monitor -- or even attack -- their networks.

The case is an embarrassing new blow for both the NSA and Booz Allen, which the New York Times said helps build and operate many of the NSA's most sensitive cyber operations.

Former NSA contractor Snowden has been living in Russia since shortly after leaking documents revealing the scope of the agency's monitoring of private data.


According to researchers from the University of California Irvine (UCI) and two Italian Universities, an attack where keystrokes are recorded during a Skype call and then reassembled as text is possible because of the acoustic emanations of computer keyboards, already a proven privacy issue.

Unlike previous research, which was based on an adversary’s physical proximity to the victim, profiling of the victim’s typing style, and/or victim’s typed information being available to the adversary, the new study proposes a new keyboard acoustic eavesdropping attack, one based on Voice-over-IP (VoIP), or the core technology behind Skype (and many other chat services out there, we might add).

In their paper (PDF), the UCI researchers argue that users typing on their desktop or laptop computer’s keyboard while participating in a Skype call become vulnerable to the demonstrated electronic eavesdropping. The VoIP software acquires acoustic emanations of pressed keystrokes and transmits them to the others involved in the VoIP call, thus creating a vulnerability.

The issue, the researchers argue, is that people often engage into secondary activities while in a VoIP call, and that some of these activities include typing. They also say that Skype conveys enough audio information to reconstruct the victim’s input with an accuracy of 91.7% if the victim’s typing style and keyboard are known (the accuracy drops to 41.89% if they aren’t known).

However, the attack is not possible if the victim uses a touchscreen or a holographic keyboard and keypad. Moreover, the researchers explain that, because Skype is encrypted, an attacker who is not part of the call can’t easily pilfer keystrokes.


Yahoo continues to seek high ground with regard to public reports that last year it scanned user email messages in compliance with a classified government order.

General counsel Ron Bell yesterday sent a letter to Director of National Intelligence James R. Clapper asking the government to confirm Yahoo was ordered to conduct surveillance on the intelligence community’s behalf, as well as declassify the order and publicly clarify the circumstances.

Yahoo’s actions were described in an Oct. 4 Reuters exclusive article that said Yahoo complied with the order by building a specialized system that would scan messages looking for an unknown specific set of characters. The company’s security team found the activity in May 2015 not long after it was deployed, and believed hackers had penetrated the Yahoo network. The Reuters article suggests that CEO Marissa Mayer bypassed the security team, asking engineers to build the system, a situation that led to the resignation of CISO Alex Stamos.

The New York Times, the next day, said that Yahoo had adapted an internal scanner designed to ferret out child pornography and spam to search for a particular “signature” aligned with terrorist organizations. The Times also said that the Justice Department obtained the custom order from the Foreign Intelligence Surveillance Court early in 2015, along with it a gag order preventing Yahoo from disclosing.

 Yesterday’s letter to Clapper is an attempt by Yahoo to maintain openness with its users in defense of their privacy.

“We appreciate the need for confidentiality in certain aspects of investigations involving public safety or national security; however, transparency is critical to ensure accountability and in this context must including disclosing how and under what set of circumstances the U.S. government uses specific legal authorities, including the Foreign Intelligence Surveillance Act, to obtain private information about individuals’ online activities or communications,” Bell wrote. “Citizens in a democracy require such information to understand and debate the appropriateness of such authorities and how the government employs them.”




When the new president takes up residence at 1600 Pennsylvania Ave., cybersecurity will be on the shortlist for action. What's a president to do?

TechNewsWorld asked more than a dozen experts what should be at the top of the new leader of the free world's cyberagenda. Following are some of their responses.

"The president has to set the tone early on cybersecurity -- within the first 100 days -- and say right off the bat that this matters," said Sam Curry, chief product officer at Cybereason.

The first priority should be protecting government systems, he explained.

"New cabinet secretaries have to understand that their mission can't be done without secure systems," said Curry. "Far too often, cybersecurity is not even on the list of priorities for initiatives and agencies and staffing."

All government agencies should be required to adopt a formal assumption of breach framework, recommended Jeffrey Carr, CEO of Taia Global.

"This means that they acknowledge that they are currently in a state of breach," he explained, "and must immediately act to identify and secure their critical assets as well as build in resiliency."


Share the Wealth

Information sharing is another issue that needs executive attention.

Some progress has been made in sharing cyberintelligence between public and private sectors during the current administration, but the next administration should ramp up those efforts, recommended Scott J. White, director of the cybersecurity program at The George Washington University.

"The United States has the largest intelligence-gathering apparatus in the world," he pointed out.

"Who is it gathering that intelligence for? If it's gathering intelligence just for its own internal consumers in government, then we're making a mistake," White continued. "We have to be able to get real-time, threat-based cyberintelligence to the private sector."

Public-private cooperation is important in organizing the nation's cybersecurity efforts, maintained Damien Van Puyvelde, an assistant professor at The University of Texas at El Paso.