Cyber specialist Jareh Sebastian Dalke, a 32-year-old residing in Colorado Springs, worked as an Information Systems Security Designer for the NSA in 2022 when he initiated contact with the undercover FBI agent.
On August 26, 2022, Dalke solicited $85,000 from what he believed to be a Russian contact in exchange for sensitive information.
The DOJ reported that Dalke sent excerpts from the documents via an encrypted email service, described only as foreign and legitimate.
Following the agreed terms, Dalke rendezvoused with the purported Russian operative at Union Station in downtown Denver, carrying a laptop.
Allegedly, Dalke handed over four documents marked Top Secret NDI, containing highly classified national defense information. Shortly thereafter, Dalke was apprehended by authorities.
Prior to his employment with the NSA, Dalke served in the U.S. Army from 2015 to 2018. Court documents revealed that he initiated the exchange by providing the undercover FBI agent with a cryptocurrency address for payment.
Furthermore, he deposited a comparable amount to the crypto exchange Kraken under his real identity. However, Dalke’s actions weren’t just misguided; they were easily traceable.
The NSA maintains meticulous records of all documents printed within its facilities, facilitating a direct link between Dalke and the leaked documents.
In September 2023, for the final exchange, an undercover agent directed Dalke to a train station in Denver, instructing him to transmit the documents over a secure connection, as stated in court documents.
Dalke, taking precautions by leaving his phone at home and disabling location services in his vehicle, parked near the station. He then entered the station and transmitted five documents via the secure connection on his laptop.
According to prosecutors, Dalke was swiftly apprehended by the FBI moments after completing the transfer.