National Guardsman Arrested For Leaking Top Secret Ukraine War Documents On Discord

from the who-could-have-possibly-seen-this-coming dept

So, we’re just handing out top secret security clearance to everyone, I guess. It was clear from the documents posted to Discord (before spreading everywhere), the person behind them would soon be located.

The folded security briefings were obviously smuggled out of secure rooms in someone’s pocket and then photographed carelessly, in one case on top of a hunting magazine. I mean, that narrows it down to people who still buy stuff printed on physical media, a number that shrinks exponentially by the day.

On top of that, the entry level for the leaked info — much of it related to the current invasion of Ukraine by Russia — was Discord, which no one has considered to be the equivalent of Signal or any other secure site for the dissemination of sensitive material.

The DOJ and Pentagon obliquely admitted that, despite some obvious clues, this hunt for the leak source might take some time. In its own estimation, the Defense Department estimated “thousands” of government employees might have access to these briefings and other national security documents. But for it to end up here (if, in fact, the government has actually gotten its man) is both surprising and a bit depressing.

Jack Teixeira, a 21-year-old member of the Massachusetts Air National Guard, was arrested by federal authorities Thursday in connection to the investigation of classified documents that were leaked on the internet.

FBI agents took Teixeira into custody earlier Thursday afternoon “without incident,” Attorney General Merrick Garland announced in brief remarks at the Department of Justice, which has been conducting a criminal investigation into the matter.

We’re apparently letting an army of weekend contributors — a division of the military best known for sandbag deployment and shooting college students — access sensitive information pertaining to a war taking place halfway around the world that they’re in no danger of being deployed to.

Perhaps this is the unintended consequence of de-siloing of intel after investigations showed the government’s ability to keep secrets from itself contributed to its inability to prevent the 9/11 attacks. Or perhaps this is the government taking a lackadaisical approach to operational security, assuming it can absorb any exposure and/or adequately punish anyone taking advantage of the government’s willingness to grant security clearance to nearly anyone remotely involved in national security.

These are still criminal allegations. But whoever was behind the leaks wasn’t doing this to serve the public good, at least not if other members of the Discord server these documents first appeared in are to be believed. Teixeira apparently dumped classified docs there because it was easy to do and he hoped these multiple federal law violations would secure him the friendship of other server members.

The Washington Post’s long report of the origin of these leaks paints a pretty disturbing picture about the person behind them.

The young member was impressed by OG’s seemingly prophetic ability to forecast major events before they became headline news, things “only someone with this kind of high clearance” would know. He was by his own account enthralled with OG, who he said was in his early to mid-20s.

“He’s fit. He’s strong. He’s armed. He’s trained. Just about everything you can expect out of some sort of crazy movie,” the member said.

In a video seen by The Post, the man who the member said is OG stands at a shooting range, wearing safety glasses and ear coverings and holding a large rifle. He yells a series of racial and antisemitic slurs into the camera, then fires several rounds at a target.

While “OG” periodically made claims he wanted other server members to “see” how the US government “really works,” he also espoused conspiracy theories and often expressed his anger that members weren’t showing enough interest in his posts. One member of this server (Thug Shaker Central, itself a bit of a racial slur) decided to post these to another Discord server. It spread from there, finally surfacing on social media sites where anyone could view them, rather than just server members.

That an air guardsman would have this access is a bit of shock, as is the lack of internal controls at whatever base employed him. More shocking is the fact the government didn’t discover this leak until after thousands of people had seen them, after they spread from Discord to Telegram to Twitter. The DOJ will definitely try to make Teixeira’s head roll, but the Pentagon has to be doing some headhunting of its own.

Whatever happens, this isn’t someone leaking documents as a service to the public. From all appearances, these leaks were motivated by a desire to win respect from online peers in a closed group. Not that it matters. An espionage prosecution doesn’t allow defendants to present public service arguments in their defense. And this case, unlike most we have covered here, doesn’t seem to have that crucial element that might justify the exposure of extremely sensitive information — especially information related to an invasion that has the possibility to result in nuclear weapon deployment and/or a Third World War. This wasn’t a selfless act. This was self-promotion.

Filed Under: , ,
Companies: discord

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “National Guardsman Arrested For Leaking Top Secret Ukraine War Documents On Discord”

Subscribe: RSS Leave a comment
28 Comments
Who Cares (profile) says:

My guess

My guess based on enlisted service (non-US) is that this guy was working in some form for communications. Because that would basically be the only place to get that kind of information and be able to walk away with it. Print it out, say you are going to bring it to the person that the message is meant for, detour through your own room to make a photo and then deliver the message.

Normally that would be almost pre-internet but a states national guard probably doesn’t have the same secure e-mail infrastructure that the US armed forces are supposed to use.

discussitlive (profile) says:

Re: I'm not guessing about this though:

national guard probably doesn’t have the same secure e-mail infrastructure that the US armed forces are supposed to use.

Run more than a “tiny” email farm, learn:
Same song, chorus, this time with feeling

Email is:
1. Not time Critical (Default is 24 hours to error notice, 5 days to final error – most folks fix that)
2. Not Guaranteed delivery (Nothing can fix that)
3. Piss poor at file transfers (Wasn’t originally designed to do it in any way, shape or form – SCP or rsync – hell UUCP is better!)
4. Not Secure absent the entire message is encrypted with a nothing subject line
5. Non-reputable

Anyone that depends on RFC email is destined for disappointment at some point unless the email only circulates on your own server and no where else.

I can’t speculate if there is another set of software somewhere that does something similar to email but is all of the things above that standard email isn’t.

Anonymous Coward says:

Re: Re: That might be true

about the time constraints for email. But, in that case, you ought to contact all those web sites that use your email address for password recovery. In many cases, the email contains a link that’s only valid for a few minutes. Seems such a mechanism ought not to work with the time constraints you mention. Or perhaps you’re still living in the days of UUCP instead of online 24/7 which many enjoy today.

Rocky says:

Re: Re: Re:

Whut?

In the case of a password recovery you explicitly initiate an action that sends you an email. If you don’t get the email within 5 minutes and can’t be bothered to follow up I guess you weren’t particularly keen on recovering your password to begin with.

You choose an odd use-case to make a point that’s not relevant at all to almost any email sent.

Anonymous Coward says:

Re: Re: Re:2

Seems you didn’t bother to read the first point the OP made about email not being timely. 24 hours to first error, etc.

I merely made the point that a fairly common use case (password recovery) required that email be received in a rather short amount of time after being sent.

Now in the past prior to 24/7 connection to the Internet became common, it wasn’t unusual for a system to periodically call another system to send traffic elsewhere and to collect traffic meant for itself and to forward elsewhere (lookup “bang path”). In that kind of environment, the 24+ hours for everything to be resolved makes sense. But in today’s environment, it doesn’t.

Rocky says:

Re: Re: Re:3

Seems you didn’t bother to read the first point the OP made about email not being timely. 24 hours to first error, etc.

Email isn’t a timely service and has never been. There’s no guarantee that an email will be “instantly” delivered even today, even though people are used to it being seemingly so. That email is usually delivered within minutes doesn’t change the fact that the underlying system is of the type store-and-forward which doesn’t necessarily report any errors/delays for up to 24 hours depending how a mail server is configured.

The argument made above for password recovery by email is based on the false premise that you are guaranteed to receive an email in a timely fashion.

This comment has been flagged by the community. Click here to show it.

Anonymous Coward says:

“This was self-promotion.”

So what?

Who cares what his motives were? He leaked documents that show the USGOVT again lying to its own citizens and pursuing potential war with a nuclear armed power…for what national interest?

Disappointing to see Tim Cushing of all people not focus on what the documents reveal about how contemptible the US security state is.

kallethen says:

Some context on why he had access

That an air guardsman would have this access is a bit of shock, as is the lack of internal controls at whatever base employed him.

While I agree with the second half of that sentence, I think the first half is a bit facetious. It’s not like he was a random guardsman who found the files. Per The Guardian:

Teixeira was an airman first class assigned to the air national guard’s 102nd intelligence wing with the title of “cyber transport systems journeyman”. A defence official told CNN that he was involved in a “24/7 operational mission” that packages intelligence from different sources into a summary for the most senior military leaders around the world.

His job was not to do the packaging but to maintain the network on which that highly classified intelligence was stored, and so needed a high-level clearance.

Anonymous Coward says:

Re: Re:

The Reserve Components of the military (Reserve and National Guard) are about 40% of the total end-strength for about 9% of the budget. If you want to maintain those people as a ready reserve, you need to provide opportunities to do the work, either in training or in support of a real-world mission.

The Air National Guard could be tasked to provide multiple different types of aircraft and capabilities to a combat effort. Pilots need to maintain their flight hours; mechanics need to turn wrenches on those aircraft; logisticians need to move people and supplies; intel personnel need to read, analyze, and write reports. This has to happen both at an individual level and collectively, at multiple levels of the organization.

The alternative is that a major peer-scale war breaks out and the military has to double in size overnight, while staring at a training pipeline of months or years to produce qualified personnel in some roles.

Anonymous Coward says:

Re:

That is one reason when I buy a printer or computer I pay with cash to leave no bank trail in case it is ever stolen, so nothing can be traced back to.me if I thief does anything illegal

I did get burglarized a few years ago. If the peeps who took it did do anything illegal with my stuff nothing could ever come back to me because I paid with cash, no cards or checks, so anything illegal they did could never come back to me

PaulT (profile) says:

Re:

So… the problem here isn’t that a random kid was using his access to supposedly confidential information to score fake internet points with people who might be working for a hostile power, but that he didn’t cover his tracks well enough?

I mean, you’re probably right if you’re in espionage, but that seems like a weird take.

This comment has been flagged by the community. Click here to show it.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...