DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Former U.S. Army Intelligence Analyst Sentenced for Selling Sensitive Military Information to Individual Tied to Chinese Government

Posted on April 23, 2025 by Dissent

A press release from the DOJ:

Army Sgt. Korbein Schultz, August 2021. Photo credit: Ryan Rayno/U.S. Army

A former U.S. Army intelligence analyst was sentenced today to 84 months in prison for conspiring to collect and transmit national defense information, including sensitive, non-public U.S. military information, to an individual he believed was affiliated with the Chinese government.

Korbein Schultz, 25, of Wills Point, Texas, pleaded guilty in August 2024 to conspiring to collect and transmit national defense information, unlawfully exporting controlled information to China, and accepting bribes in exchange of sensitive, non-public U.S. government information.

“This defendant swore an oath to defend the United States — instead, he betrayed it for a payout and put America’s military and service members at risk,” said Attorney General Pamela Bondi. “The Justice Department remains vigilant against China’s efforts to target our military and will ensure that those who leak military secrets spend years behind bars.”

“This sentencing is a stark warning to those who betray our country: you will pay a steep price for it,” said FBI Director Kash Patel. “The People’s Republic of China is relentless in its efforts to steal our national defense information, and service members are a prime target. The FBI and our partners will continue to root out espionage and hold those accountable who abandon their obligation to safeguard defense information from hostile foreign governments.”

“Those who collaborate with America’s foreign adversaries put our country, and those who defend it, at grave risk and we will do whatever it takes to hold them accountable for their crimes,” said Acting U.S. Attorney Robert E. McGuire for the Middle District of Tennessee. “We will proudly stand in support of our men and women in uniform and work diligently to protect them from people like the defendant who would sell them out for a few bucks.”

“Protecting classified information is paramount to our national security, and this sentencing reflects the ramifications when there is a breach of that trust,” said Brigadier General Rhett R. Cox, Commanding General of the Army Counterintelligence Command. “This Soldier’s actions put Army personnel at risk placing individual gain above personal honor. Army Counterintelligence Command, in close collaboration with the Department of Justice, the Federal Bureau of Investigation, and the Intelligence Community, remains steadfast in our commitment to safeguarding our nation’s secrets and urges all current and former Army personnel to report any suspicious contact immediately.”

According to court documents, between May 2022 until his arrest in March 2024, Schultz engaged in an ongoing conspiracy to provide dozens of sensitive U.S. military documents — many containing export-controlled tactical and technical information — directly to a foreign national residing in the People’s Republic of China. Despite clear indications that this individual, who is referenced in the Indictment as Conspirator A, was likely connected to the Chinese government, the defendant continued the relationship in exchange for financial compensation. In exchange for approximately $42,000, Schultz provided documents and data related to U.S. military capabilities, including:

  • His Army unit’s operational order before it was deployed to Eastern Europe in support of NATO operations;
  • Lessons learned by the U.S. Army from the Ukraine/Russia conflict applicable to Taiwan’s defense;
  • Technical manuals for the HH-60 helicopter, F-22A fighter aircraft, and Intercontinental Ballistic Missile systems;
  • Information on Chinese military tactics and the People’s Liberation Army Rocket Force;
  • Details on U.S. military exercises in the Republic of Korea and the Philippines;
  • Documents concerning U.S. military satellites and missile defense systems like the High Mobility Artillery Rocket System (HIMARS) and Terminal High Altitude Area Defense (THAAD).
  • Tactics for countering unmanned aerial systems in large-scale combat operations.

Conspirator A first contacted the defendant through a freelance web-based work platform shortly after the defendant received his Top Secret/Sensitive Compartmented Information (TS/SCI) clearance. Masquerading as a client from a geopolitical consulting firm, Conspirator A solicited the defendant to produce detailed analyses on U.S. military capabilities and planning, particularly in relation to Taiwan and the Russia-Ukraine conflict.

As the relationship progressed, Conspirator A’s demands grew increasingly specific and sensitive — requesting technical manuals, operational procedures, and intelligence assessments. Conspirator A made explicit his interest in materials that were not publicly available and encouraged the defendant to seek out higher levels of classification, emphasizing “exclusiveness” and “CUI and better.”  Schultz agreed to obtain higher levels of classified information for Conspirator A in exchange for money.

The defendant, fully aware of the grave national security implications, used his position and access to restricted databases — including closed U.S. government computer networks — to download and transmit at least 92 sensitive U.S. military documents.

The case also revealed attempts by the defendant to recruit his friend and fellow Army intelligence analyst into the conspiracy. At the time, Schultz’s friend was assigned to the U.S. Department of Defense’s Indo-Pacific Command (INDOPACOM), which is the combatant command that covers China and its regional areas of influence. Schultz and Conspirator A discussed the need to recruit another person into their scheme who had better access to classified material. They agreed that such recruitment needed to be done in a “nice and slow fashion.”

The FBI’s Nashville Field Office investigated the case, with valuable assistance from the U.S. Army Counterintelligence Command and the Department of Defense.

Assistant U.S. Attorney Josh Kurtzman for the Middle District of Tennessee and Trial Attorneys Adam Barry and Christopher Cook of the National Security Division’s Counterintelligence and Export Control Section prosecuted the case.

Updated April 23, 2025

Source: U.S. Department of Justice


Related:

  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
  • Inquiry launched after identities of SAS soldiers leaked in fresh data breach
  • Government will 'robustly defend' compensation claims from Afghans put at risk by data breach
  • More than 100 British government personnel exposed by Ministry of Defence data leak
Category: Government SectorInsiderOf Note

Post navigation

← Au: Hacking suspect nabbed over court file data breach
Blue Shield of California shared the health data of 4.7 million people with Google for years →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • White House ordered to restore Medicaid funding to Planned Parenthood clinics
  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com
  • Canada’s Bill C-2 Opens the Floodgates to U.S. Surveillance
  • Wiretap Suits Pit Old Privacy Laws Against New AI Technology
  • Action against tiny Scottish charity sparks huge ICO row
  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.