Military Documents Related To F-35 Lightning II Leaked On Social Media (2024)

The intelligence community once went to great lengths to gain a potential adversary's military secrets. The United States CIA spent years trying to obtain a Soviet T-72 main battle tank (MBT) while it reportedly paid the Afghan Mujahedeen $5,000 for the first captured AK-74 assault rifle in the early 1980s.

Today, the IC doesn't need to send spies on covert missions and instead can turn to social media and gaming forums, where a treasure trove of classified materials has been posted. The most recent was just this past week when an alleged Russian pilot posted documents related to the United States Air Force's F-35 Lightning II and F-15 Eagle jet fighters on the Telegram social messaging app.

News of the story was first reported by the South China Morning Post (SCMP), which cited Chinese military aviation experts who confirmed the documents were legitimate. According to the paper of record, the files—which have since been removed—contained the engine maintenance manual for the F110 engine used in the F-15SA, a variant of the F-15 Eagle in service with Saudi Arabia. In addition, a flight and maintenance manuals for the aircraft were also posted on the "Fighterbomber" channel on Telegram.

Documents related to the Lockheed Martin F-35 Lightning II, the U.S. military's advanced fifth-generation jet fighter were also shared online. Though some of the information was redacted and declassified, this still highlights how easily leaked information can be shared—and no doubt America's adversaries are watching closely.

"A return to Great Power Competition after 20 years of counterinsurgency has changed the intelligence collection landscape. Russia, China, North Korea, and Iran are working diligently to gain access to as much military-related data as possible and will use any means to do so," warned Jonathon Molik, director of the New York National Guard J2 Intelligence and Security Directorate.

Telegram—The Not So Hidden Spy Network

Telegram has become a go-to source for military information, especially following Russia's unprovoked invasion of Ukraine—in part, because it has remained a platform still widely accessible in Russia. It has also become the preferred network for pro-Kremlin propagandists.

"Telegram has often been a go-to encrypted messaging communication platform, particularly used by threat actor groups to share data stolen from target organizations during cyber attacks," explained cyber security expert Alexandra Forsyth.

"This creates a sense of authenticity and trustworthiness. Depending on the type of data being advertised and shared, one could argue financial incentive is the reason for it being shared, however, security researchers also take into consideration political and ideological agendas as well," added Forsyth. "It could be that the threat actor sharing sensitive information is looking to be seen as an authoritative figure in the community, which can lead to collaborating with higher-rank groups."

The Changing Motivation

What has also been noteworthy about the recent leaks of military hardware secrets is the motivation. Intelligence agencies have employed various techniques to recruit individuals to share secrets and engage in espionage activities. The main pillars of "spy recruitment" can be summed up with the acronym "MICE," which includes Money, Ideology, Coercion/Compromise, and Ego.

The gamers who have posted manuals of tanks and aircraft have increasingly done it to make a point to others, and it would seem that this recent leak of classified materials was also done very much for "ego."

"People may also leak files to show their expertise or win arguments online. This manner is seen in forums like War Thunder. Some people might not fully comprehend the severe consequences or underestimate the dangers," said Tom Jauncey, CEO of digital marketing agency Nautilus Marketing

"Other reasons consist of ideological ideals or a preference to expose perceived wrongdoings," added Jauncey. "But, this is rare in social media leaks. Sometimes, leaks result from poor judgment or a misguided attempt to seek peer validation."

Yet, there may be more to the story. In the digital era, the democratization of information sharing can blur the lines between whistleblower and leaker.

"Some individuals may perceive their actions as a form of digital activism, driven by a belief in transparency over secrecy. The recent spate of classified leaks via social platforms could reflect a more complex interplay of psychological, cultural, and technological factors than the MICE framework might suggest," suggested Jason Levin, founder of media strategy provider Cyber Patterns.

MORE FROMFORBES ADVISOR

Best High-Yield Savings Accounts Of 2024ByKevin PayneContributor
Best 5% Interest Savings Accounts of 2024ByCassidy HortonContributor

"While 'Ego' certainly plays a role, empowering individuals with a perceived cloak of digital anonymity, the rapid democratization of information sharing also plays into these incidents," Levin added.

Modern social media platforms not only offer a stage for displaying power or dissent but also create environments where barriers to sharing sensitive information are drastically lowered, Levin noted. The convergence of these elements has in turn created a perfect storm, where ideological motivations merge with the thrill of subversion and the ease of digital dissemination.

"This phenomenon suggests a paradigm shift in how sensitive information is handled and perceived in the digital age," Levin continued. "Additionally, the instant feedback loop provided by social media can further incentivize individuals, making the act of leaking more about instant gratification or protest than calculated espionage. Thus, these incidents might not just reflect personal motivations but also a growing disconnect between the accessibility of digital platforms and the traditional protocols of information security."

Military Documents Related To F-35 Lightning II Leaked On Social Media (2024)
Top Articles
Latest Posts
Recommended Articles
Article information

Author: Gregorio Kreiger

Last Updated:

Views: 5633

Rating: 4.7 / 5 (77 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Gregorio Kreiger

Birthday: 1994-12-18

Address: 89212 Tracey Ramp, Sunside, MT 08453-0951

Phone: +9014805370218

Job: Customer Designer

Hobby: Mountain biking, Orienteering, Hiking, Sewing, Backpacking, Mushroom hunting, Backpacking

Introduction: My name is Gregorio Kreiger, I am a tender, brainy, enthusiastic, combative, agreeable, gentle, gentle person who loves writing and wants to share my knowledge and understanding with you.