DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

U.S. Government Employee Arrested for Attempting to Provide Classified Information to Foreign Government

Posted on May 30, 2025May 30, 2025 by Dissent

Yet another reminder of the insider threat: a press release from the Department of Justice. Ironically, this insider worked for the Insider Threat Division of the Defense Intelligence Agency.

An IT specialist employed by the Defense Intelligence Agency (DIA) was arrested today for attempting to transmit national defense information to an officer or agent of a foreign government.

Nathan Vilas Laatsch, 28, of Alexandria, Virginia, was arrested today in northern Virginia, and will make his initial court appearance in the Eastern District of Virginia tomorrow.

According to court documents, Laatsch became a civilian employee of the DIA in 2019, where he works with the Insider Threat Division and holds a Top Secret security clearance. In March 2025, the FBI commenced an operation after receiving a tip that an individual — now known to be Laatsch — offered to provide classified information to a friendly foreign government. In that email, the sender wrote that he did not “agree or align with the values of this administration” and was therefore “willing to share classified information” that he had access to, including “completed intelligence products, some unprocessed intelligence, and other assorted classified documentation.”

After multiple communications with an FBI agent — who Laatsch allegedly believed to be an official of the foreign government — Laatsch began transcribing classified information to a notepad at his desk and, over the course of approximately three days, repeatedly exfiltrated the information from his workspace. Laatsch subsequently confirmed to the FBI agent that he was prepared to transmit the information.

Thereafter, the FBI implemented an operation at a public park in northern Virginia, where Laatsch believed he would deposit the classified information for the foreign government to retrieve. On or about May 1, 2025, FBI surveillance observed Laatsch proceed to the specified location and deposit an item. Following Laatsch’s departure, the FBI retrieved the item, which was a thumb drive later found to contain a message from Laatsch and multiple typed documents, each containing information that was portion-marked up to the Secret or Top Secret levels. The message from Laatsch indicated that he had chosen to include “a decent sample size” of classified information to “decently demonstrate the range of types of products” to which he had access.

After receiving confirmation that the thumb drive had been received, on May 7, Laatsch allegedly sent a message to the FBI agent, which indicated Laatsch was seeking something from the foreign government in return for continuing to provide classified information. The next day, Laatsch specified that he was interested in “citizenship for your country” because he did not “expect[] things here to improve in the long term.” Although he said he was “not opposed to other compensation,” he was not in a position where he needed to seek “material compensation.”

On May 14, the FBI agent advised Laatsch that it was prepared to receive additional classified information. Between May 15 and May 27, Laatsch again repeatedly transcribed multiple pages of notes while logged into his classified workstation, folded the notes, and exfiltrated the classified information in his clothing.

On May 29, Laatsch arrived at a prearranged location in northern Virginia, where Laatsch again allegedly attempted to transmit multiple classified documents to the foreign country. Laatsch was arrested upon the FBI’s receipt of the documents.

Sue J. Bai, head of the Justice Department’s National Security Division, U.S. Attorney Erik S. Siebert for the Eastern District of Virginia, Assistant Director Roman Rozhavsky of the FBI’s Counterintelligence Division, and Executive Director Lee M. Russ of Air Force Office of Special Investigations (OSI) Office of Special Projects made the announcement.

The FBI Washington Field Office is investigating the case, with valuable assistance provided by the U.S. Air Force OSI and with thanks to the Defense Intelligence Agency for its cooperation.

Trial Attorneys Christina Clark and Mark Murphy of the National Security Division’s Counterintelligence and Export Control Section and Assistant U.S. Attorney Gordon Kromberg for the Eastern District of Virginia are prosecuting the case.

A criminal complaint is merely an allegation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

Updated May 29, 2025
Category: Breach Incidents

Post navigation

← St. Cloud Provides Update on Ransomware Attack in 2024
Victoria’s Secret takes down website after security incident →

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • Class action settlement following ransomware attack will cost Fred Hutchinson Cancer Center about $52 million
  • Comstar LLC agrees to corrective action plan and fine to settle HHS OCR charges
  • Australian ransomware victims now must tell the government if they pay up
  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Victoria’s Secret takes down website after security incident
  • U.S. Government Employee Arrested for Attempting to Provide Classified Information to Foreign Government
  • St. Cloud Provides Update on Ransomware Attack in 2024
  • Bradford Health Systems detected abnormal network activity in December 2023. They first sent out breach notices this week.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans
  • The US Is Storing Migrant Children’s DNA in a Criminal Database

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.