An active-duty U.S. Army soldier stationed at Fort Bliss in El Paso, Texas, was arrested on charges of attempting to transmit classified national defense information to a foreign adversary, the Department of Justice (DOJ) announced.
Taylor Adam Lee, 22, allegedly sought to share sensitive technical details about the M1A2 Abrams tank with Russian operatives, an alarming breach given the tank’s critical role in U.S. military operations.
According to court documents, Lee began his espionage activities in May by attempting to provide export-controlled technical data and U.S. Army credentials to individuals he believed represented Russia’s Ministry of Defense.
He reportedly expressed his willingness to assist the Russian government, stating, “The USA is not happy with me for trying to expose their weaknesses,” and adding, “At this point I’d even volunteer to assist the Russian federation when I’m there in any way.”
Last month, Lee allegedly met in person with someone he believed was a Russian official, handing over an SD card containing sensitive documents on the Abrams tank and other armored fighting vehicles.
He also reportedly provided hardware components related to the tank, delivering them to a storage unit in El Paso and confirming the transfer with the message, “Mission accomplished.”
The M1A2 Abrams tank is a cornerstone of the U.S. Army’s armored forces, valued for its advanced armor, firepower and mobility.
Since its introduction in the 1990s, it has played a key role in U.S. military operations worldwide, including the Gulf War and Iraq War, according to Military.com.
The disclosure of its technical specifications and potential vulnerabilities to a foreign nation such as Russia could have implications for U.S. military operations and equipment security.
Insider threats remain a significant concern for national security.
According to a summary of the Defense Counterintelligence and Security Agency’s (DCSA) latest report by Small Wars Journal, foreign intelligence entities are increasingly targeting cleared personnel and sensitive U.S. technologies—including classified data and systems—through sophisticated collection methods from academia and industry.
Assistant Attorney General for National Security John A. Eisenberg stressed the seriousness of the offense, assuring that the DOJ is working closely with law enforcement and military partners to hold those who betray their country fully accountable.
FBI Assistant Director Roman Rozhavsky echoed the sentiment, warning that Lee’s arrest serves as a warning to anyone contemplating betraying the United States, particularly members of the armed forces entrusted with its most sensitive secrets.
Under U.S. law, espionage and unauthorized export of military technology carry severe penalties.
The Espionage Act permits lengthy prison terms for those convicted of sharing national defense information, while the International Traffic in Arms Regulations (ITAR) strictly govern the export of defense-related materials and data.
Violations of these regulations can result in substantial fines and imprisonment.
The FBI’s Washington and El Paso Field Offices, in coordination with the Army Counterintelligence Command, continue investigating the case.
Prosecution is being led by the National Security Division’s Counterintelligence and Export Control Section and the Western District of Texas.
Military officials have reiterated the importance of reporting suspicious behavior promptly to protect personnel and equipment.
The post Army Soldier Arrested for Allegedly Attempting to Sell Classified Tank Secrets to Russia appeared first on Resist the Mainstream.
Click this link for the original source of this article.
Author: Gloriel Howard
This content is courtesy of, and owned and copyrighted by, https://resistthemainstream.org and its author. This content is made available by use of the public RSS feed offered by the host site and is used for educational purposes only. If you are the author or represent the host site and would like this content removed now and in the future, please contact USSANews.com using the email address in the Contact page found in the website menu.