Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Retired US Air Force Employee Pleads Guilty for Sharing Military Secrets on a Dating App

Posted on July 14, 2025July 14, 2025 By CWS

A former U.S. Air Power worker has pleaded responsible to costs of sharing categorised navy details about Russia’s conflict in Ukraine by way of a courting software, in keeping with federal court docket paperwork. 

David Franklin Slater, who labored as a civilian worker at america Strategic Command (USSTRATCOM), admitted to transmitting SECRET-level nationwide protection data to a person claiming to be a Ukrainian lady between February and April 2022.

Key Takeaways1. Retired Air Power Lt. Colonel David Slater pleaded responsible to sharing TOP SECRET navy intelligence from U.S. Strategic Command through courting app.2. Slater transmitted categorised Russia-Ukraine conflict data to somebody posing as a Ukrainian lady who requested NATO plans and weapon provide particulars.3. Confronted three federal counts beneath 18 U.S.C. § 793 for disclosing SECRET/NOFORN-marked nationwide protection data.4. Slater intentionally violated safety protocols defending delicate navy information.

Navy Intelligence Leaked By way of Relationship App Rip-off

The case reveals how international actors exploited on-line courting platforms to extract delicate data from navy personnel. 

Co-Conspirator 1, who claimed to be a Ukrainian lady, systematically requested categorised data by way of messages similar to “what’s proven on the screens within the particular room?” and “Dave, it’s nice that you simply get details about [Specified Country 1] first”.

The co-conspirator’s requests turned more and more particular, asking about NATO plans, weapon provides, and navy intelligence. 

Messages like “Candy Dave, the availability of weapons is totally categorised, which is nice!” and “You’ve got a job within the Operations Heart at the moment, I keep in mind, I’m positive there’s lots of fascinating information there?” demonstrated a deliberate effort to assemble categorised Nationwide Protection Data (NDI).

Federal prosecutors famous that the transmitted data was categorised beneath Govt Orders 12958, 13292, and 13526, which set up that SECRET-level data might trigger “critical injury to nationwide safety” if disclosed. 

The case was prosecuted beneath the Counterintelligence and Export Management Part of the Nationwide Safety Division, highlighting the counterintelligence implications of the breach.

Espionage Costs Below Federal Regulation

Slater confronted three federal costs beneath the Espionage Act. The first cost was conspiracy to reveal nationwide protection data beneath 18 U.S.C. § 793(g), together with two counts of unauthorized disclosure of nationwide protection data beneath 18 U.S.C. § 793(d) for incidents occurring on March 28, 2022, and April 13, 2022.

The defendant held a TOP SECRET//SCI (TS//SCI) safety clearance and had signed a nondisclosure settlement (NDA) in August 2021, which explicitly warned that “unauthorized disclosure, unauthorized retention, or negligent dealing with of SCI might trigger irreparable damage to america or be used to benefit by a international nation”. 

As a retired Lieutenant Colonel assigned to USSTRATCOM in Nebraska, Slater attended categorised briefings relating to Russia’s navy operations in Ukraine.

Slater’s safety coaching included programs on Unauthorized Disclosure of Categorised Data, Counterintelligence Reporting and Consciousness, and Not Releasable to International Nationals (NOFORN) Classification Coaching, which made his actions much more depressing given his data of safety protocols.

The case serves as a stark reminder of the vulnerabilities that social engineering assaults pose to nationwide safety infrastructure.

Examine reside malware habits, hint each step of an assault, and make quicker, smarter safety selections -> Strive ANY.RUN now 

Cyber Security News Tags:Air, App, Dating, Employee, Force, Guilty, Military, Pleads, Retired, Secrets, Sharing

Post navigation

Previous Post: Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More
Next Post: RenderShock 0-Click Vulnerability Executes Payloads via Background Process Without User Interaction

Related Posts

Detecting and Remediating Misconfigurations in Cloud Environments Cyber Security News
OneLogin AD Connector Vulnerabilities Exposes Authentication Credentials Cyber Security News
Chrome 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code Cyber Security News
Insecure GitHub Actions in Open Source Projects MITRE and Splunk Exposes Critical Vulnerabilities Cyber Security News
Predictive Cyber Risk Analysis Using Aggregated Threat Intelligence Cyber Security News
HPE Insight Remote Support Vulnerability Let Attackers Execute Remote Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Practice Safe Torrenting
  • Wing FTP Server Vulnerability Actively Exploited
  • The Unusual Suspect: Git Repos
  • New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries
  • Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Practice Safe Torrenting
  • Wing FTP Server Vulnerability Actively Exploited
  • The Unusual Suspect: Git Repos
  • New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries
  • Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News