A former U.S. Army Sergeant stationed at Joint Base Lewis-McChord has admitted to attempting to provide classified military information to Chinese intelligence services, marking a significant national security breach case.
Joseph Daniel Schmidt, 31, pleaded guilty to federal espionage charges in Seattle federal court, facing up to a decade in prison for his efforts to compromise American military secrets during a three-year period living in China.
Schmidt entered guilty pleas on Wednesday before U.S. District Judge John C. Coughenour to two serious federal felonies: attempt to deliver national defense information and retention of national defense information.
Acting U.S. Attorney Teal Luthy Miller announced that Schmidt’s sentencing is scheduled for September 9, 2025, where he could face up to ten years in federal prison and a $250,000 fine for each charge.
The guilty plea represents a conclusion to a complex counterespionage investigation that spanned multiple years and countries.
Schmidt’s case highlights the ongoing concerns about insider threats within the U.S. military and the persistent efforts by foreign intelligence services to recruit American service members with access to classified information.
The charges specifically relate to his attempts to provide national defense information to Chinese authorities and his unauthorized retention of classified materials after leaving military service.
According to Report, Schmidt initiated contact with Chinese intelligence services through multiple channels, beginning with outreach to the Chinese Consulate in Turkey before establishing direct communication with Chinese security services via email.
In March 2020, he traveled to Hong Kong, where he continued his espionage activities for over three years.
During his time in China, primarily in Hong Kong, Schmidt created extensive documentation describing various “high level secrets” he was prepared to provide to the Chinese government.
His efforts included offering the secure network access device to Chinese authorities, potentially compromising American military cybersecurity infrastructure.
Schmidt remained in Chinese territory until October 2023, when he returned to the United States.
His espionage activities came to an end when he flew into San Francisco International Airport in October 2023, where FBI agents arrested him upon arrival.
The investigation was conducted by the FBI with crucial assistance from the U.S. Army Counterintelligence Command, while Assistant U.S. Attorney Todd Greenberg is prosecuting the case with support from the National Security Division’s Counterintelligence and Export Control Section.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…