The Pentagon is Investigating “Critical Compromise” in Air Force

The Pentagon is Investigating “Critical Compromise” in Air Force

image provided by pixabay

This post is also available in: heעברית (Hebrew)

$90,000 worth of equipment has allegedly been stolen from an air force base in Tennessee by an Air Force engineer, who reportedly granted himself “unauthorized administrator access” to sensitive military radio communications.

The Pentagon is currently investigating a possible “critical compromise” of communications in 17 US air force facilities, as reported by Forbes. A base contractor indicated that the 48-year-old Aid Force engineer could potentially access radio communications tech that is used by the Air Education and Training Command (AETC), one of nine major commands (MAJCOM) of the air force.

Investigators found that the suspect has been running a Motorola radio programming software, which according to Forbes the software “contained the entire Arnold air force base (AAFB) communications system”. He also allegedly has a USB containing “administrative passwords and electronic system keys” for the AETC radio network.

According to Forbes, the suspected engineer’s LinkedIn page indicates that he is very experienced in cybersecurity and radio communications and has carried out several tests of air force base security.

Investigators were told by witnesses and co-workers that the suspect often lied, worked at odd hours, had financial problems, acted inappropriately in the workplace, and even had air force radio equipment in his possession.

This reported breach follows just three months after a Massachusetts Air National Guardsman called Jack Teixeira leaked classified US military documents on the instant messaging platform Discord.

The charges state that he posted images of the Top-Secret documents complete with military standard TOP SECRET/ SECRET markings in January 2022. He has since been charged under the Espionage Act.