Air Force Disciplines 15 as IG Finds That Security Failures Led to Massive Classified Documents Leak

The Air Force has disciplined 15 personnel in connection with the massive classified documents leak by an airman earlier this year, concluding that multiple officials intentionally failed to take required action on his suspicious behavior, the Air Force inspector general reported Monday.
Massachusetts Air National Guard member Jack Teixeira is accused of leaking highly classified military from the 102nd Intelligence Wing at Otis Air National Guard Base in Massachusetts where he worked.
The punitive actions range from relieving personnel from their positions, including command positions, to non-judicial punishment under Article 15 of the Uniform Code of Military Justice.
Teixeira, who's 21, has been behind bars since his April arrest on charges stemming from the most consequential intelligence leak in years.
He is charged under the Espionage Act with unauthorized retention and transmission of classified national defense information.
He has pleaded not guilty, and no trial date has been set.
Teixeira enlisted in the Air National Guard in 2019.
He shared military secrets he illegally collected from his intelligence unit with other Discord users, authorities said - first by typing out classified documents he accessed and then sharing photographs of files that bore SECRET and TOP SECRET markings.
In its investigation of the leaks, the Air Force inspector general found both security gaps occurred in part because personnel had access to classified documents without supervision, and because in instances where Airman 1st Class Teixeira was caught violating security policies none of the personnel who either witnessed the violations or had responsibility for Teixeira took the actions necessary in response.
Teixeira worked as a cyber transport systems specialist, essentially an information technology specialist responsible for military communications networks.
Teixeira had often unsupervised access as part of a three-person team at night to Top Secret-Secret Compartmentalized facility to perform maintenance inspections.
Teixeira remains in the Air National Guard in an unpaid status, Air Force spokeswoman Ann Stefanek said.
In fall 2022 Teixeira was seen writing down notes from a classified document onto a Post-It note.
While he was confronted about the note, there was no follow up to ensure the note had been shredded and the incident was not reported to security officers.
It was not until a January 2023 incident that the appropriate security officials were notified, but even then security officials were not briefed on the full scope of the violations.
The documents released on social media revealed sensitive U.S. intelligence on the Russia-Ukraine war, the Middle East and an array of other topics.
Sean Riley, 102nd Intelligence Wing commander, received administrative action and was relieved of command and the 102nd Intelligence, Surveillance and Reconnaissance Group commander Col.
Enrique Dovalo, received administrative action for concerns with unit culture and compliance with policies and standards.
The Air Force also said previously suspended commanders from the 102nd Intelligence Support Squadron and the detachment overseeing administrative support for airmen at the unit mobilized for duty under Title 10 USC were permanently removed.
The Air Force took the intelligence mission from the 102nd after Teixeira's leaks were discovered and the group's mission remains reassigned to other units.


This Cyber News was published on www.securityweek.com. Publication date: Tue, 12 Dec 2023 14:13:10 +0000


Cyber News related to Air Force Disciplines 15 as IG Finds That Security Failures Led to Massive Classified Documents Leak

Air Force Disciplines 15 as IG Finds That Security Failures Led to Massive Classified Documents Leak - The Air Force has disciplined 15 personnel in connection with the massive classified documents leak by an airman earlier this year, concluding that multiple officials intentionally failed to take required action on his suspicious behavior, the Air ...
1 year ago Securityweek.com
CVE-2022-24296 - Use of a Broken or Risky Cryptographic Algorithm vulnerability in Air Conditioning System G-150AD Ver. 3.21 and prior, Air Conditioning System AG-150A-A Ver. 3.21 and prior, Air Conditioning System AG-150A-J Ver. 3.21 and prior, Air Conditioning ...
3 years ago
Systemic security failures aided US Air Force Discord leaker The Register - There was only one US Air National Guardsman behind the leak of top-secret US military documents on Discord, but his chain of command bears some responsibility for letting it happen on their watch. The US Air Force reached that conclusion in an ...
1 year ago Go.theregister.com
Virustotal Shares New Ideas to Track Threat Actors - In a recent presentation at the FIRST CTI in Berlin and Botconf in Nice, VirusTotal unveiled innovative methods to track adversary activity by focusing on images and artifacts used during the initial stages of the kill chain. Traditionally, threat ...
1 year ago Cybersecuritynews.com APT28
Report Surfaces Extent of SaaS Application Insecurity - An analysis of how 493 organizations are employing software-as-a-service applications published today by Wing Security finds nearly all experienced a security incident involving at least one application. A full 81% reported security incidents ...
1 year ago Securityboulevard.com
Survey Surfaces Raft of Cloud Security Challenges - A global survey of 414 IT practitioners published this week found 40% of respondents are relying on legacy platforms and practices originally designed for on-premises IT environments to secure cloud computing environments. Conducted by Aviatrix, a ...
1 year ago Securityboulevard.com
Embracing Security as Code - Everything is smooth until it isn't because we traditionally tend to handle the security stuff at the end of the development lifecycle, which adds cost and time to fix those discovered security issues and causes delays. Over the years, software ...
1 year ago Feeds.dzone.com
Cybersecurity jobs available right now: October 2, 2024 - Help Net Security - As an Applied Cybersecurity Engineer (Center for Securing the Homeland), you will apply interdisciplinary competencies in secure systems architecture and design, security operations, threat actor behavior, risk assessment, and network security to ...
8 months ago Helpnetsecurity.com
Top 30 Best Penetration Testing Tools - 2025 - The tool supports various protocols and offers advanced filtering and analysis capabilities, making it ideal for diagnosing network issues, investigating security incidents, and understanding complex network interactions during penetration testing. ...
2 months ago Cybersecuritynews.com
Microsoft Security Copilot improves speed and efficiency for security and IT teams - First announced in March 2023, Microsoft Security Copilot-Microsoft's first generative AI security product-has sparked major interest. With the rapid innovations of Security Copilot, we have taken this solution beyond security operations use cases ...
1 year ago Microsoft.com
How to Integrate Security into Agile Dev Teams - By demonstrating persistent attention to security culture, practices, and outcomes, leaders signal that security integration is not a temporary initiative but a fundamental and permanent aspect of how agile teams operate and deliver value to ...
2 months ago Cybersecuritynews.com
What Is Cloud Security Management? Types & Strategies - Cloud security management is the process of safeguarding cloud data and operations from attacks and vulnerabilities through a set of cloud strategies, tools, and practices. The cloud security manager and the IT team are generally responsible for ...
1 year ago Esecurityplanet.com
Kubescape open-source project adds Vulnerability Exploitability eXchange support - With its innovative feature for generating reliable Vulnerability Exploitability eXchange documents, Kubescape became the first open-source project to provide this functionality. This advancement offers security practitioners a powerful tool to ...
1 year ago Helpnetsecurity.com
'Defunct' DOJ ransomware task force raises questions, concerns | TechTarget - "The Office of the Deputy Attorney General (ODAG) memorandum that established the Ransomware Task Force also contained several strategic areas, including directing the Ransomware Task Force to design and implement a strategy to disrupt and dismantle ...
8 months ago Techtarget.com LockBit
6 Best Cloud Security Companies & Vendors in 2024 - Cloud security companies specialize in protecting cloud-based assets, data, and applications against cyberattacks. To help you choose, we've analyzed a range of cybersecurity companies offering cloud security products and threat protection services. ...
1 year ago Esecurityplanet.com
10 Best Security Service Edge Solutions - Security Service Edge is an idea in cybersecurity that shows how network security has changed over time. With a focus on customized solutions, Security Service Edge Solutions leverages its expertise in multiple programming languages, frameworks, and ...
1 year ago Cybersecuritynews.com
Five business use cases for evaluating Azure Virtual WAN security solutions - To help organizations who are evaluating security solutions to protect their Virtual WAN deployments, this article considers five business use cases and explains how Check Point enhances and complements Azure security with its best-of-breed, ...
1 year ago Blog.checkpoint.com
Trustwave Relaunches Advanced Continual Threat Hunting with Human-Led Methodology - Trustwave recently relaunched its Advanced Continual Threat Hunting with Human-Led Methodology offering. The security solution provides organizations with a human-led methodology for continual threat hunting, vulnerability analysis, threat ...
2 years ago Csoonline.com
Strengthening Security Posture Through People-First Engagement - Regular, small doses of security education help combat the “forgetting curve,” a theory developed by Hermann Ebbinghaus that suggests people forget 75% of newly learned information within a couple of days. These statistics underscore a critical ...
8 months ago Informationsecuritybuzz.com
How Digital Forensics Supports Incident Response: Insights For Security Leaders - This article explores how digital forensics enhances incident response, the essential techniques involved, and practical strategies for security leaders to implement robust DFIR capabilities. Digital forensics focused on the collection, preservation, ...
1 month ago Cybersecuritynews.com
Ukraine says it hacked Russian aviation agency, leaks data - Ukraine's intelligence service, operating under the Defense Ministry, claims they hacked Russia's Federal Air Transport Agency, 'Rosaviatsia,' to expose a purported collapse of Russia's aviation sector. Rosaviatsia is the agency responsible for ...
1 year ago Bleepingcomputer.com
4 key devsecops skills for the generative AI era - Experts believe that generative AI capabilities, copilots, and large language models are ushering in a new era of how developers, data scientists, and engineers will work and innovate. They expect AI to improve productivity, quality, and innovation, ...
1 year ago Infoworld.com
New Survey Finds a Paradox of Confidence in Software Supply Chain Security - Get results of and analysis on ESG's new survey on supply chain security. New research reveals that, despite increasing attacks and incidents against software supply chains, a surprising number of firms believe their defense is sufficient. This gap ...
1 year ago Securityboulevard.com
1Kosmos Unifies Identity Verification User Journeys Across Web and Mobile Platforms - PRESS RELEASE. EAST BRUNSWICK, N.J., Nov. 29, 2023 - 1Kosmos, the company that unifies identity proofing and passwordless authentication, today announced the 1Kosmos BlockID platform now enables organizations to seamlessly extend web-based identity ...
1 year ago Darkreading.com
70 million account credentials were leaked in a massive password dump - A security researcher has unearthed what appears to be one of the biggest password dumps ever. Over 70 million unique credentials have been leaked on the dark web. ADVERTISEMENT. The news came to light when Troy Hunt, the owner of the popular breach ...
1 year ago Ghacks.net