05:34 PM
Connect Directly

U.S. Defense Department Official Charged With Espionage

A civilian employee at the Pentagon has been charged with conspiring to provide classified information to an agent with ties to the People's Republic of China.

In an expansion of an espionage investigation disclosed last year, a Defense Department official has been charged with conspiring to provide classified information to an agent with ties to the People's Republic of China (PRC).

The accused, James Wilbur Fondren Jr., 62, was a civilian employee at the Pentagon and the deputy director of the Washington Liaison Office of the U.S. Pacific Command. He retired from active duty in the U.S. Air Force as a lieutenant colonel in 1996. He has been on administrative leave since February 2008, when the Justice Department announced the arrests of several individuals for stealing military aerospace secrets and sending them to China.

One of the individuals arrested last year was Tai Shen Kuo, a furniture businessman and a naturalized U.S. citizen. Another was former Defense Department employee Gregg William Bergersen.

In March 2008, Bergersen pleaded guilty to conspiring to provide U.S. defense information to China and was later sentenced to almost five years in prison.

In May 2008, Kuo pleaded guilty to similar charges. He subsequently was sentenced to more than 15 years in prison. Kuo was a close associate of Fondren's and was a guest at Fondren's house at the time of his arrest. Fondren allegedly believed Kuo to have ties with officials in Taiwan rather than with the PRC.

The FBI affidavit in Kuo's case describes a sweeping surveillance operation directed at Kuo. In addition to physical surveillance, the FBI monitored his e-mail accounts at Bellsouth.net, Gmail, and Hotmail, as well as his telephone communications. The agency also covertly copied the hard drive on Kuo's laptop and placed audiovisual surveillance equipment in a car Kuo rented.

The FBI affidavit filed as part of the case against Fondren suggests that the agency's eavesdropping operation helped incriminate Fondren as well as Kuo. It includes transcripts of several conversations between Fondren and Kuo about the transfer of classified information that allegedly occurred in Fondren's Annandale, Va., home.

Dana J. Boente, acting U.S. attorney for the Eastern District of Virginia, called the allegations in the Fondren case "troubling" and said, "The U.S. government places considerable trust in those given access to classified information, and we are committed to prosecuting those who abuse that trust."

Rick Howard, director of security intelligence at VeriSign iDefense, said that this kind of espionage goes on all the time. "All governments have espionage operations where they're trying to turn people to give them inside information," he said.

It's noteworthy, he said, that this isn't cyberespionage. "It's traditional spy-vs.-spy stuff," he said.

Howard said that while every organization that deals with sensitive information has procedures to protect that information, "it's not too hard to defeat those things if you're determined."

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
According to industry estimates, about a million new IT security jobs will be created in the next two years but there aren't enough skilled professionals to fill them. On top of that, there isn't necessarily a clear path to a career in security. Dark Reading Executive Editor Kelly Jackson Higgins hosts guests Carson Sweet, co-founder and CTO of CloudPassage, which published a shocking study of the security gap in top US undergrad computer science programs, and Rodney Petersen, head of NIST's new National Initiative for Cybersecurity Education.