In a striking reminder of how insider threats continue to evolve in the digital age, a civilian employee of the U.S. Air Force assigned to U.S. Strategic Command (USSTRATCOM) at Offutt Air Force Base pleaded guilty to conspiring to transmit classified national defense information (NDI) to a foreign individual via an online dating platform.
The incident, which occurred between February and April 2022, involved a former military officer who had access to some of the most sensitive information the U.S. government possesses—information he knowingly chose to share with someone he believed to be a woman living in Ukraine. This case underscores the importance of strong insider threat detection protocols, behavioral monitoring, and compliance programs.
Case Summary: When Experience Is Not Enough
According to court documents, 64-year-old David Franklin Slater of Nebraska, a retired U.S. Army Lieutenant Colonel, held a Top-Secret security clearance and worked in a classified space at USSTRATCOM beginning in August 2021.
Slater had access to high-level briefings concerning Russia’s invasion of Ukraine, which were classified up to TOP SECRET//SENSITIVE COMPARTMENTED INFORMATION (TS//SCI). These briefings included critical details such as:
- Russian military operations and capabilities,
- Military targets and operational assessments,
- Sensitive and non-public U.S. intelligence on foreign adversaries.
Rather than safeguarding this information, Slater conspired to share it through a foreign dating website’s messaging platform with a user who claimed to be a woman in Ukraine. The user referred to him as her “secret informant love” and “secret agent,” regularly requesting sensitive details. Despite years of military experience and counterintelligence awareness, Slater complied.
A High-Stakes Breach of Duty
Assistant Attorney General for National Security John A. Eisenberg stated:
“The defendant, an employee of the United States Air Force with access to some of our Nation’s most closely held secrets, shared classified information with someone claiming to be a foreigner on an online dating platform.”
U.S. Attorney Lesley A. Woods for the District of Nebraska added:
“David Slater failed in his duty to protect this information by willingly sharing National Defense Information with an unknown online personality despite having years of military experience.”
The FBI’s Omaha Field Office, in coordination with the Air Force Office of Special Investigations, led the investigation. Special Agent in Charge Eugene Kowel commented:
“Mr. Slater betrayed an oath he made to safeguard our nation’s intelligence. Leveraging his access to sensitive information, Mr. Slater chose to transmit material that put our country at risk.”
Slater pleaded guilty to conspiracy to transmit national defense information, a charge that carries a maximum sentence of 10 years in prison, up to three years of supervised release, and a fine of $250,000.
What This Means for National Security and Organizations
This case serves as a cautionary tale for both government agencies and private organizations. Even individuals with long, decorated careers and security training are not immune to manipulation, poor judgment, or negligence.
The most sophisticated security infrastructure in the world can still be undermined by a single insider acting with intent—or being coerced through emotional, financial, or ideological influence.
Key Takeaways:
Insider threats are not always malicious; they can be emotionally manipulated.
Access control and monitoring alone are insufficient without behavioral analysis and context.
Continuous education and awareness are essential, even for those with prior military or security experience.
Why Insider Threat Preparedness Must Be a Top Priority
The Risk Is Real – and Often Unexpected
This case is a sobering reminder that insider threats can stem not only from malicious actors but also from poor judgment or manipulation.
Despite years of military training, Slater became compromised through emotional and social engineering tactics via an online platform.
The fact that such sensitive military intelligence was transmitted through a non-secure, foreign-operated messaging platform highlights key organizational vulnerabilities.
Organizations Must Prepare Before a Breach Occurs
Every agency and organization handling sensitive or classified information must have clear insider threat response protocols and compliance processes in place.
These frameworks must be proactive, rather than reactive, and designed to detect threats before significant damage can occur.
Key Insider Threat Preparedness Measures Include:
- Access control systems that restrict sensitive data to authorized users with active need-to-know status
- User behavior analytics (UBA) tools that flag unusual activity, such as off-hours access or large data downloads
- Insider threat programs with clearly defined escalation procedures and communication plans
- Security training and awareness programs for all personnel, regardless of rank or seniority
- Regular audits and compliance checks aligned with NIST, CMMC, DFARS, and other federal standards
Conclusion: Being Compliant Is Not Enough—You Must Be Ready
Slater’s case underscores the importance of not only having access controls, but also having plans and tools ready when insider threats occur.
Organizations must detect, investigate, and respond to suspicious behavior with urgency and clarity—before classified data leaves the building.
Be Proactive, Not Reactive
Contact TMPC Inc today to learn how we can strengthen your insider threat program and ensure full compliance.
For more information, visit our site, reach out on the contact page, or directly email at joe.teasley@tmpcinc.com where you can find out more about proper Insider Threat Risk Management and get in touch with our team.ross your operations.