{"id":55505,"date":"2024-03-05T14:26:48","date_gmt":"2024-03-05T14:26:48","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35614\/An-Air-Force-Employee-Shared-Highly-Classified-Data-Via-Dating-App.html"},"modified":"2024-03-05T14:26:48","modified_gmt":"2024-03-05T14:26:48","slug":"an-air-force-employee-shared-highly-classified-data-via-dating-app","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/an-air-force-employee-shared-highly-classified-data-via-dating-app\/","title":{"rendered":"An Air Force Employee Shared Highly Classified Data Via Dating App"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/i.kinja-img.com\/image\/upload\/c_fill,h_675,pg_1,q_80,w_1200\/6ae2b9726cd640478921d2d95b27dc66.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p class=\"sc-77igqf-0 fnnahv\">A civilian employee of the U.S. Air Force has been arrested and charged with sharing highly classified military information on a <span><a class=\"sc-1out364-0 dPMosf sc-145m8ut-0 jCErAQ js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;Internal link&quot;,&quot;https:\/\/gizmodo.com\/flirt-with-los-mayers-app-developer-dating-art-1851258014&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/gizmodo.com\/flirt-with-los-mayers-app-developer-dating-art-1851258014\">dating app<\/a><\/span>, according to an announcement from the <span><a class=\"sc-1out364-0 dPMosf sc-145m8ut-0 jCErAQ js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.justice.gov\/opa\/pr\/air-force-employee-indicted-unlawful-disclosure-classified-national-defense-information&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/www.justice.gov\/opa\/pr\/air-force-employee-indicted-unlawful-disclosure-classified-national-defense-information\" target=\"_blank\" rel=\"noopener noreferrer\">U.S. Department of Justice<\/a><\/span> on Monday. And it\u2019s pretty clear from the indictment that whoever this man was talking to knew what she was after.<\/p>\n<div class=\"sc-1needdh-1 fzSzvw\">\n<div class=\"sc-1needdh-0 enlHCF instream-native-video instream-permalink instream-native-video--mobile\">\n<div class=\"sc-1h0epat-0 jiQRXG\">\n<div class=\"sc-1wkneyl-4 kDKXjm video-html5-playlist\" data-playlist=\"196617,196607,196596\" data-current=\"196617\">\n<div class=\"sc-1wkneyl-0 hAZDOz video-html5-loaded\">\n<div class=\"sc-1wkneyl-1 jShsAa video-html5-player\">\n<div class=\"sc-lhhce6-0 biVjcq video-html5 autoplay muted mobile\" data-video-id=\"196617\" data-monetizable=\"true\" data-position=\"sidebar\" data-video-title=\"The Epitome of 14 inch Gaming | Asus ROG Zephyrus G14 Review\" data-video-blog-id=\"4\" data-video-network=\"gizmodo\" data-video-duration=\"157\" readability=\"4.6567164179104\">\n<div class=\"sc-lhhce6-2 emBeiF video-top-bar\" readability=\"7\">\n<p>The Epitome of 14 inch Gaming | Asus ROG Zephyrus G14 Review<\/p>\n<\/div>\n<p><video disablepictureinpicture muted playsinline width=\"100%\" height=\"100%\" crossorigin=\"anonymous\" preload=\"none\"><source data-src=\"https:\/\/vid.kinja.com\/prod\/196617\/196617_240p.mp4\" label=\"240p\" type=\"video\/mp4\"><source data-src=\"https:\/\/vid.kinja.com\/prod\/196617\/196617_480p.mp4\" label=\"480p\" type=\"video\/mp4\"><source data-src=\"https:\/\/vid.kinja.com\/prod\/196617\/196617_720p.mp4\" label=\"720p\" type=\"video\/mp4\"><source data-src=\"https:\/\/vid.kinja.com\/prod\/196617\/196617_1080p.mp4\" label=\"1080p\" type=\"video\/mp4\"><track kind=\"captions\" label=\"English\" src=\"https:\/\/kinja.com\/api\/videoupload\/caption\/22172.vtt\" srclang=\"en\"><\/video><\/p>\n<div class=\"sc-1yhvqfu-3 ghtqRH video-controls\">\n<div class=\"sc-1yhvqfu-2 elBHkL\">\n<div class=\"sc-1sfctwm-2 fXTnmP closed-captions-box hide\">\n<div class=\"sc-1sfctwm-1 jglhFk\">\n<div class=\"sc-1sfctwm-0 hbyQRD\">\n<ul>\n<li class=\"selected\" data-label>Off<\/li>\n<li class data-label=\"English\">English<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 fnnahv\">David Franklin Slater, a 63-year-old from Nebraska, was arrested March 2 and charged with transmitting classified material. Slater, a retired U.S. Army lieutenant colonel, held a Top Secret security clearance and worked at U.S. Strategic Command at Offutt Air Force Base until he was arrested on Saturday.<\/p>\n<div class=\"sc-17kx9cd-5 kDVAgq js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic\">\n<div class=\"sc-17kx9cd-4 bNalPz ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 fnnahv\">The indictment alleges Slater was using an unnamed foreign dating site where he provided an unnamed woman with extremely sensitive information about the war in Ukraine. Russia first invaded Ukraine in late February 2022 and the messages quoted in the indictment start on March 7 of that year, less than a month after the conflict began. The war has taken the lives of <span><a class=\"sc-1out364-0 dPMosf sc-145m8ut-0 jCErAQ js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.washingtonpost.com\/world\/2024\/02\/25\/ukraine-war-casualties-zelensky-russia\/&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/www.washingtonpost.com\/world\/2024\/02\/25\/ukraine-war-casualties-zelensky-russia\/\" target=\"_blank\" rel=\"noopener noreferrer\">tens of thousands<\/a><\/span> on both sides over the past two years, with no end in sight.<\/p>\n<div class=\"sc-17kx9cd-5 kDVAgq js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic\">\n<div class=\"sc-17kx9cd-4 bNalPz ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 fnnahv\">The messages Slater received from the unnamed woman are peppered with loving phrases and indicate she claimed to be from Ukraine. But they also betray the fact that whoever Slater was actually talking to clearly wanted secret information by using pleasantries that included specific requests for details such as:<\/p>\n<div class=\"sc-17kx9cd-5 kDVAgq js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic\">\n<div class=\"sc-17kx9cd-4 bNalPz ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<ul data-type=\"List\" data-style=\"Bullet\" class=\"sc-1lmbno3-0 iPScqk\">\n<li>\u201cAmerican Intelligence says that already 100% of Russian troops are located on the territory of Ukraine. Do you think this information can be trusted?\u201d<\/li>\n<li>\u201cDear, what is shown on the screens in the special room?? It is very interesting.\u201d<\/li>\n<li> \u201cBy the way, you were the first to tell me that NATO members are traveling by train and only now (already evening) this was announced on our news. You are my secret informant love! How were your meetings? Successfully?\u201d <\/li>\n<li> \u201cBeloved Dave, do NATO and Biden have a secret plan to help us?\u201d <\/li>\n<\/ul>\n<p class=\"sc-77igqf-0 fnnahv\">Some of the messages were redacted by U.S. prosecutors in such a way as to not reveal the name of a given country:<\/p>\n<div class=\"sc-17kx9cd-5 kDVAgq js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic\">\n<div class=\"sc-17kx9cd-4 bNalPz ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<ul data-type=\"List\" data-style=\"Bullet\" class=\"sc-1lmbno3-0 iPScqk\">\n<li>\u201cDave, it\u2019s great that you get information about [Specified Country 1] first. I hope you will tell me right away? You are my secret agent. With love.\u201d<\/li>\n<li> \u201cSweet Dave, the supply of weapons is completely classified, which is great!\u201d <\/li>\n<li> \u201cMy sweet Dave, thanks for the valuable information, it\u2019s great that two officials from the USA are going to Kyiv.\u201d <\/li>\n<li>\u201cDave, I hope tomorrow NATO will prepare a very unpleasant \u2018surprise\u2019 for Putin! Will you tell me?\u201d<\/li>\n<li>\u201cYou have a job in the Operations Center today, I remember, I\u2019m sure there is a lot of interesting news there?\u201d<\/li>\n<\/ul>\n<div class=\"sc-17kx9cd-5 kDVAgq js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic\">\n<div class=\"sc-17kx9cd-4 bNalPz ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 fnnahv\">Slater responded to these romantic messages with classified info, according to prosecutors, including military targets in Russia. The indictment claims Slater responded via email and the dating site between February and April of 2022.<\/p>\n<p class=\"sc-77igqf-0 fnnahv\">As an ally of Ukraine, the U.S. military has been assisting the country with both weapons and intelligence, some of which has leaked in embarrassing ways\u2014including when 21-year-old airman Jack Teixeira allegedly posted secret intelligence to impress his friends on Discord in 2022. Teixeira was arrested in 2023 and is expected to plead guilty <span><a class=\"sc-1out364-0 dPMosf sc-145m8ut-0 jCErAQ js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;Internal link&quot;,&quot;https:\/\/gizmodo.com\/jack-teixeira-pentagon-leaks-massachusetts-discord-data-1851299145&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/gizmodo.com\/jack-teixeira-pentagon-leaks-massachusetts-discord-data-1851299145\">this week<\/a><\/span>.<\/p>\n<div class=\"sc-17kx9cd-5 kDVAgq js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic\">\n<div class=\"sc-17kx9cd-4 bNalPz ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 fnnahv\">\u201cCertain responsibilities are incumbent to individuals with access to Top Secret information. The allegations against Mr. Slater challenge whether he betrayed those responsibilities,\u201d U.S. Attorney Susan Lehr for the District of Nebraska said in a statement <span><a class=\"sc-1out364-0 dPMosf sc-145m8ut-0 jCErAQ js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.justice.gov\/opa\/pr\/air-force-employee-indicted-unlawful-disclosure-classified-national-defense-information&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/www.justice.gov\/opa\/pr\/air-force-employee-indicted-unlawful-disclosure-classified-national-defense-information\" target=\"_blank\" rel=\"noopener noreferrer\">published online<\/a><\/span>. <\/p>\n<p class=\"sc-77igqf-0 fnnahv\">\u201cWe look forward to continuing our work with the FBI and the Air Force Office of Special Investigations to ensure the safety of our country,\u201d Lehr continued.<\/p>\n<div class=\"sc-17kx9cd-5 kDVAgq js_ad-mobile-dynamic js_ad-dynamic ad-mobile-dynamic\">\n<div class=\"sc-17kx9cd-4 bNalPz ad-unit ad-mobile\">\n<p>Advertisement<\/p>\n<\/div>\n<\/div>\n<p class=\"sc-77igqf-0 fnnahv\">Slater is scheduled to make his first court appearance on Tuesday and faces up to 10 years in prison, three years of supervised release, and a fine of up to $250,000 for each count, according to <span><a class=\"sc-1out364-0 dPMosf sc-145m8ut-0 jCErAQ js_link\" data-ga=\"[[&quot;Embedded Url&quot;,&quot;External link&quot;,&quot;https:\/\/www.justice.gov\/opa\/pr\/air-force-employee-indicted-unlawful-disclosure-classified-national-defense-information&quot;,{&quot;metric25&quot;:1}]]\" href=\"https:\/\/www.justice.gov\/opa\/pr\/air-force-employee-indicted-unlawful-disclosure-classified-national-defense-information\" target=\"_blank\" rel=\"noopener noreferrer\">prosecutors<\/a><\/span>.<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35614\/An-Air-Force-Employee-Shared-Highly-Classified-Data-Via-Dating-App.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":55506,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[10872],"class_list":["post-55505","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentusadata-lossspywaremilitary"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>An Air Force Employee Shared Highly Classified Data Via Dating App 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/an-air-force-employee-shared-highly-classified-data-via-dating-app\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An Air Force Employee Shared Highly Classified Data Via Dating App 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/an-air-force-employee-shared-highly-classified-data-via-dating-app\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-05T14:26:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i.kinja-img.com\/image\/upload\/c_fill,h_675,pg_1,q_80,w_1200\/6ae2b9726cd640478921d2d95b27dc66.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/an-air-force-employee-shared-highly-classified-data-via-dating-app\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/an-air-force-employee-shared-highly-classified-data-via-dating-app\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"An Air Force Employee Shared Highly Classified Data Via Dating App\",\"datePublished\":\"2024-03-05T14:26:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/an-air-force-employee-shared-highly-classified-data-via-dating-app\\\/\"},\"wordCount\":667,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/an-air-force-employee-shared-highly-classified-data-via-dating-app\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/an-air-force-employee-shared-highly-classified-data-via-dating-app.jpg\",\"keywords\":[\"headline,government,usa,data loss,spyware,military\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/an-air-force-employee-shared-highly-classified-data-via-dating-app\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/an-air-force-employee-shared-highly-classified-data-via-dating-app\\\/\",\"name\":\"An Air Force Employee Shared Highly Classified Data Via Dating App 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/an-air-force-employee-shared-highly-classified-data-via-dating-app\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/an-air-force-employee-shared-highly-classified-data-via-dating-app\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/an-air-force-employee-shared-highly-classified-data-via-dating-app.jpg\",\"datePublished\":\"2024-03-05T14:26:48+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/an-air-force-employee-shared-highly-classified-data-via-dating-app\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/an-air-force-employee-shared-highly-classified-data-via-dating-app\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/an-air-force-employee-shared-highly-classified-data-via-dating-app\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/an-air-force-employee-shared-highly-classified-data-via-dating-app.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/an-air-force-employee-shared-highly-classified-data-via-dating-app.jpg\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/an-air-force-employee-shared-highly-classified-data-via-dating-app\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,usa,data loss,spyware,military\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentusadata-lossspywaremilitary\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"An Air Force Employee Shared Highly Classified Data Via Dating App\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"An Air Force Employee Shared Highly Classified Data Via Dating App 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/an-air-force-employee-shared-highly-classified-data-via-dating-app\/","og_locale":"en_US","og_type":"article","og_title":"An Air Force Employee Shared Highly Classified Data Via Dating App 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/an-air-force-employee-shared-highly-classified-data-via-dating-app\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-03-05T14:26:48+00:00","og_image":[{"url":"https:\/\/i.kinja-img.com\/image\/upload\/c_fill,h_675,pg_1,q_80,w_1200\/6ae2b9726cd640478921d2d95b27dc66.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/an-air-force-employee-shared-highly-classified-data-via-dating-app\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/an-air-force-employee-shared-highly-classified-data-via-dating-app\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"An Air Force Employee Shared Highly Classified Data Via Dating App","datePublished":"2024-03-05T14:26:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/an-air-force-employee-shared-highly-classified-data-via-dating-app\/"},"wordCount":667,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/an-air-force-employee-shared-highly-classified-data-via-dating-app\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/an-air-force-employee-shared-highly-classified-data-via-dating-app.jpg","keywords":["headline,government,usa,data loss,spyware,military"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/an-air-force-employee-shared-highly-classified-data-via-dating-app\/","url":"https:\/\/www.threatshub.org\/blog\/an-air-force-employee-shared-highly-classified-data-via-dating-app\/","name":"An Air Force Employee Shared Highly Classified Data Via Dating App 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/an-air-force-employee-shared-highly-classified-data-via-dating-app\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/an-air-force-employee-shared-highly-classified-data-via-dating-app\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/an-air-force-employee-shared-highly-classified-data-via-dating-app.jpg","datePublished":"2024-03-05T14:26:48+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/an-air-force-employee-shared-highly-classified-data-via-dating-app\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/an-air-force-employee-shared-highly-classified-data-via-dating-app\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/an-air-force-employee-shared-highly-classified-data-via-dating-app\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/an-air-force-employee-shared-highly-classified-data-via-dating-app.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/an-air-force-employee-shared-highly-classified-data-via-dating-app.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/an-air-force-employee-shared-highly-classified-data-via-dating-app\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,usa,data loss,spyware,military","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentusadata-lossspywaremilitary\/"},{"@type":"ListItem","position":3,"name":"An Air Force Employee Shared Highly Classified Data Via Dating App"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55505","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55505"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55505\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/55506"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55505"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55505"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}