Ex CIA analyst pleads guilty to leaking info on Israeli attack

Views:

Asif Rahman, 34, was arrested by the FBI in November weeks after classified documents appeared on the Telegram messaging app [GETTY]

A former CIA analyst pleaded guilty Friday to leaking information on a planned Israeli attack on Iran.

Asif Rahman, 34, was arrested by the FBI in November, weeks after classified documents appeared on the Telegram messaging app.

He entered guilty pleas in federal court in Virginia to two counts of wilful retention and transmission of classified information related to the national defence, each carrying a maximum sentence of 10 years in prison.

Prosecutors say Rahman, a CIA employee since 2016, abused his access to top-secret information by printing out documents related to Israel so that he could take them home.

Prosecutors say he reproduced and altered them to cover his tracks, then leaked top-secret documents to people not authorised to receive them.

Two documents that surfaced on Telegram in October, attributed to the National Geospatial-Intelligence Agency and National Security Agency, noted that Israel was still moving military assets in place to conduct a military strike in response to Iran’s blistering ballistic missile attack on 1 October.

Israel carried out a retaliatory attack on air defence systems and missile manufacturing facilities in Iran in late October. In court papers, the government has said the leak caused Israel to delay its attack plans.

The documents were shareable within the “Five Eyes,” which are the United States, Britain, Canada, New Zealand and Australia.

Rahman was born in California and moved with his family when he was a child to Cincinnati, where he was a high school valedictorian, according to court papers submitted by his lawyer.

He went to Yale University and graduated in three years. He and his wife now live in the DC metro area, along with his parents.

La source de cet article se trouve sur ce site

LEAVE A REPLY

Please enter your comment!
Please enter your name here

SHARE:

spot_imgspot_img