DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Department of State employee sentenced for transmitting national defense information to suspected Chinese government agents

Posted on September 4, 2025 by Dissent

Today’s reminder of the insider threat, from the U.S. Attorney’s Office for the Eastern District of Virginia:

ALEXANDRIA, Va. – A U.S. Department of State (DOS) employee was sentenced today to four years in prison for conspiring to collect and transmit national defense information to individuals he knew to be working for the government of the People’s Republic of China (PRC).

“The price of Michael Schena’s disgraceful betrayal of his country is far more than the paltry amount for which he traded his honor,” said Erik S. Siebert, U.S. Attorney for the Eastern District of Virginia. “His acts of selfish avarice left that price to be paid by the faithful women and men of our intelligence community and the nation they serve. The cost Schena will pay is the loss of his integrity, his reputation, and, by today’s sentence, his freedom.”

“The defendant threw away his career, betrayed his country, and abused the trust the United States placed in him by granting his Top Secret security clearance.  He will spend years of his life in prison for passing classified information to individuals he believed to be Chinese government agents,” said Assistant Attorney General for National Security John A. Eisenberg. “Today’s sentence serves as a warning to those who would violate the trust placed in them by our Nation and double-cross the American people.”

“Michael Schena deliberately undermined U.S. national security and put American lives at risk by selling classified information to the Chinese Government,” said Assistant Director Roman Rozhavsky of the FBI’s Counterintelligence Division. “The Chinese government continues to aggressively target U.S. government employees to steal our classified information, and this sentencing makes clear the FBI and our partners will do everything in our power to defend the Homeland. Anyone thinking of betraying their oath to the United States should consider the severe consequences and know the FBI will work tirelessly to bring them to justice.”

“As a State Department employee, Schena’s mission should have been to promote U.S. security and prosperity throughout the world, but instead he jeopardized national security by transmitting classified information to individuals whom he believed worked for an adversarial government,” said Daniel Wierzbicki, Special Agent in Charge of the FBI Washington Field Office’s Counterintelligence and Cyber Division. “As today’s sentencing demonstrates, the U.S. government remains committed to investigating and prosecuting clearance holders who seek to cash in on our nation’s secrets.”

According to court documents, beginning in April 2022, Michael Charles Schena, 42, of Alexandria, communicated with people he met online through various communication platforms and provided them sensitive government information in exchange for money. Two of these individuals represented themselves as employees of international consulting companies. Despite clear indications that they were working on behalf of the PRC, Schena continued his relationship with them.

In August 2024, Schena met an individual at a hotel in Peru who provided Schena $10,000 and a cellphone that was intended to be used for Schena to receive taskings and to image and transmit information.

In October 2024, while at work, Schena photographed and transmitted at least four classified documents that contained national defense information and were classified at the SECRET level. In February 2025, surveillance video captured Schena again using the cellphone he received in Peru to photograph seven documents marked as SECRET that contained national defense information. FBI agents seized the cellphone before Schena could transmit photographs of these classified documents to his handlers and was later arrested.

The announcement was made after sentencing by U.S. District Judge Michael S. Nachmanoff.

The FBI Washington Field Office investigated the case with assistance from the FBI Richmond Field Office, the Department of Justice’s Office of Enforcement Operations, and the Department of State’s Diplomatic Security Service Office of Counterintelligence.

Assistant U.S. Attorneys Michael Ben’Ary and Gavin R. Tisdale for the Eastern District of Virginia and Trial Attorney Maria Fedor of the National Security Division’s Counterintelligence and Export Control Section prosecuted the case.

Category: Government SectorInsider

Post navigation

← Salesloft Drift Breach Rolls Up Cloudflare, Palo Alto, Zscaler, and Others
Qantas CEO, top executives lose $522,000 in pay for major cyber breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Once a Patient’s in Custody, ICE Can Be at Hospital Bedsides — But Detainees Have Rights
  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.