In an alarming security breach, an Air Force engineer is under suspicion for compromising critical Department of Defense (DoD) communications, as indicated by a search warrant obtained by Forbes. The same engineer’s involvement in a possible breach of FBI communications has also come to light, raising concerns about the extent of the damage. The Pentagon is taking the matter seriously and is actively investigating the incident, which has affected communications across 17 Air Force facilities and involved an alleged theft of government radio technologies valued at almost $90,000.
The investigation was prompted by a tip from a base contractor, alleging that the 48-year-old engineer had taken government radio equipment home without authorization, using it for personal purposes.
When law enforcement executed a raid at his residence, they discovered that he had “unauthorized administrator access” to radio communications tech utilized by the Air Education and Training Command (AETC), affecting a significant number of DoD installations. Although the specific nature and scope of the information taken remain undisclosed, these troubling developments emerged just three months after a separate major security breach at the Pentagon, where an Air National Guard employee was accused of leaking sensitive information on a social platform.
The engineer in question has not yet been charged, leading Forbes to withhold his identity from publication. Both the Department of Defense and the Air Force have yet to provide any official comments on the ongoing investigation, while the Justice Department has declined to comment. During the raid, investigators found evidence that the suspect had access to the FBI’s communications and various Tennessee state agencies, raising concerns about potential further leaks and compromises.
Witnesses and co-workers have also shed light on the engineer’s concerning behavior, including the alleged sale of radios and radio equipment, inappropriate workplace conduct, and financial problems.
A colleague had previously reported him for unauthorized possession of Air Force equipment and “insider threat indicators.” Moreover, according to his LinkedIn profile, the engineer has a background in cybersecurity and radio communications, which adds another layer of complexity to the investigation.
Forensic analysis of the seized technologies revealed that the suspect possessed administrative passwords and electronic system keys for the AETC radio network on a USB drive. Investigators also found “local law enforcement radio programming files” and “Motorola radio programming files,” labeled as U.S. government property. The installer files recovered from the search were labeled “CONFIDENTIAL RESTRICTED,” indicating their sensitive nature.
As the investigation unfolds, the government faces the challenge of understanding the full extent of the breach and implementing measures to prevent similar incidents in the future.
The potential compromise of both Air Force and FBI communications demands immediate attention, and authorities are actively working to contain the situation and assess the impact on national security.