It’s raining military secrets!
Earlier this week, it was revealed that a group of hackers got their meathooks on an operator manual for the United States military’s MQ-9 Reaper UAV. The manual was fair game: a U.S. Air Force captain had it stashed away on his under-protected home network—you know, as one does with sensitive documents that could fuck with national security. My guess is that the captain wasn’t aware of the case against military contractor Jared Sparks. The company Sparks was employed by was developing an underwater drone for the U.S. Navy. While he was drawing a paycheck from them Sparks decided it’d be cool to upload scads of documents that detailed trade secrets to his personal Dropbox account.
The Navy, Sparks’ former employers and the U.S. Department of Justice? They weren’t really comfortable with that. Today, the Department of Justice announced that a federal jury has found Sparks guilty of multiple counts of the theft and of uploading of trade secrets, with each count carrying a penalty that could land Sparks in the clink for a decade.
Sparks used to work for LBI Inc., a Connecticut-based defense contractor that makes underwater drones for the U.S. Navy, as well as weather data-gathering buoys for the National Oceanic and Atmospheric Administration. While at that company, he collaborated with Charles River Analytics (CRA), a company that made software for the LBI drones. Sparks was eventually hired by CRA in January 2012, but before he switched jobs, he saved sensitive company and military information—including renderings and design photos of LBI drones and buoys—onto the cloud-storage service Dropbox, according to DOJ.
So, I dunno, maybe think twice before bringing your work home with you.