WASHINGTON On July 28, Diana Toebbe posted a Facebook message looking for a babysitter to take care of her children early on the coming Saturday morning for five to six hours.
Later the post, visible only to friends, was updated with the word *FOUND*. And on that Saturday, Ms. Toebbe accompanied her husband, Jonathan, to south-central Pennsylvania.
Unbeknown to Ms. Toebbe, she and her husband were being watched by the F.B.I. as they left their home in Annapolis, Md. And the bureaus agents continued to watch in Pennsylvania as Jonathan Toebbe removed from his shorts pocket a 32-gigabyte memory card hidden in a sealed Band-Aid wrapper, which he then, according to court papers, placed in a container set up by an undercover F.B.I. operative.
The Toebbes, accused by the U.S. government of trying to sell some of Americas most closely guarded submarine propulsion secrets to a foreign government, are scheduled to appear in federal court in West Virginia on Tuesday. They will face charges related to violating the Atomic Energy Acts prohibition on sharing nuclear know-how.
For now, the big questions surrounding the couple what country they are accused of trying to sell the nuclear secrets to, and what motivated them to take the risk remain unanswered.
Mr. Toebbe was described by acquaintances as a diligent and organized grad student in nuclear physics who was commissioned in the Navy as an officer and expert in submarine propulsion. He continued as a civilian in the Navy after finishing his military service, considered by some a plum assignment for the most talented nuclear physicists.
Ms. Toebbe was a 10-year veteran of the Key School, a progressive private school in Annapolis, where she taught history and English. There, according to parents, she was prone to talking about her Ph.D. in anthropology from Emory University and her love of knitting. She was a respected adviser, both formally and informally, at the school.
You could just tell she was insanely smart, said Craig Martien, 20, a 2019 graduate of Key School who worked closely with Ms. Toebbe on the yearbook and an after-school anthropology club. She was very friendly and down-to-earth, and I got along with her very well.
When Mr. Martien went off to Williams College, he brought along a toy squid that Ms. Toebbe had knitted. Like other Key graduates, Mr. Martien described her as a strong feminist and very liberal.
She was taken aback by President Donald J. Trumps 2016 election, he said, and mentioned several times that she was considering moving to Australia.
She said she couldnt stand the current state of politics and actually had found some job opportunities over there, he said.
On social media platforms, Ms. Toebbe shared photographs of her dogs, her children, meals cooking on the stove, a family vacation and selfies ordinary scenes of an ordinary life, one far different than the amateur cloak-and-dagger act portrayed in the F.B.I. affidavit.
Having made contact with the as-yet undisclosed other country about providing submarine secrets, the Toebbes were reluctant to expose themselves in an in-person meeting, according to the narrative laid out in court documents by the F.B.I. But their apparent desire for cryptocurrency payments led them to agree to the undercover operatives demand they deposit information in a dead drop location a decision that ultimately exposed their identity to the F.B.I.
Evidence in the court documents suggests the foreign country the Toebbes allegedly tried to sell the information to was an ally, or at least something of a partner, since it cooperated with the F.B.I. as the sting operation unfolded. While some experts speculated France could have been the target, French officials said they were not involved in the incident.
The hearing on Tuesday will be short. So far as the government knows, neither Jonathan nor Diana Toebbe has a lawyer. Prosecutors asked the court on Monday to hold Mr. Toebbe rather than granting him bail, saying he could face life in prison and was a flight threat. The magistrate judge could also set a hearing date for the couples continued detention.
Public records searches turned up no signs of financial distress that could provide a motivation for them to try to sell American secrets.
Yet the F.B.I. affidavit portrayed the couple as willing to take risks for the promise of payments in a cryptocurrency called Monero.
In February, F.B.I. agents, posing as a representative of the foreign country, proposed an in-person meeting. The response, which was signed Alice, a common placeholder name in military cryptography, wrote that face to face meetings are very risky for me, as I am sure you understand, according to the affidavit. The writer then proposed passing information electronically in exchange for $100,000 in the cryptocurrency.
Please remember I am risking my life for your benefit and I have taken the first step. Please help me trust you fully, the note to the undercover F.B.I. agents read.
The F.B.I. agents then pressed for a neutral drop location. The response came a few days later: I am concerned that using a dead drop location your friend prepares makes me very vulnerable, the note from Alice said, according to the affidavit. If other interested parties are observing the location, I will be unable to detect them. I am not a professional, and do not have a team supporting me.
The note went on to propose that the writer would choose a drop location for the encrypted files. The F.B.I. agents responded that they would give first $10,000 then $20,000 in cryptocurrency at a drop location of their choosing.
I am sorry to be so stubborn and untrusting, but I cannot agree to go to a location of your choosing, the response from Alice said. I must consider the possibility that I am communicating with an adversary who has intercepted my first message and is attempting to expose me.
The writer next proposed that the country provide reassurance by sending a signal from its complex in Washington over Memorial Day weekend.
Writing from an encrypted Proton mail account, Alice said the signal had been received, and agreed to drop the material at the location chosen by the undercover operative a mistake in tradecraft, some experts said.
It was somewhat surprising that someone who has studied submarine warfare follows the F.B.I.s direction to surface for these supposedly clandestine drop offs, said Michael Atkinson, a former inspector general for the intelligence community.
The willingness on the part of the country to convey the unspecified signal suggests its cooperation with the United States throughout the investigation. Mr. Atkinson said it was very unusual for a foreign country to allow its embassy or other facility to be used to send a signal to a suspect being pursued by the F.B.I.
Mr. Atkinson, now a partner at the law firm Crowell & Moring, said a similar false flag operation by the F.B.I. involving a government scientist trying to sell secrets to an ally resulted in a prison sentence of 13 years after a plea bargain.
At the Key School, where Ms. Toebbe taught, and in their Annapolis neighborhood, colleagues, students and neighbors tried to process the arrest of the couple and the accusations against them.
Luke Koerschner, 20, a 2019 Key School graduate now at Michigan State University, was in Ms. Toebbes advisory group for four years. He described her as very friendly and welcoming, an outgoing teacher who loved to cheer on her students in the schools cornhole tournaments.
Matthew Nespole, the head of the Key School, said he was shocked and appalled to learn of the charges against the Toebbes and that the school supports the administration of justice by the F.B.I. and NCIS, and will cooperate with the investigation. The Key School placed Ms. Toebbe on leave indefinitely.
Julian E. Barnes reported from Washington, and Brenda Wintrode and JoAnna Daemmrich from Annapolis, Md. Kitty Bennett contributed research. David E. Sanger contributed reporting from Washington.
Read the rest here:
Submarine Spy Case Involved a Babysitter and a Band-Aid Wrapper - The New York Times
- To Foil NSA Spies, Encrypt Everything [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What is cryptography? - A Word Definition From the ... [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- cryptography: Definition from Answers.com [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - Wikipedia, the free encyclopedia [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography - CISSP Domain 07 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Faraday Project for Network Security and Cryptography - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Overview of Cryptography - Gary C. Kessler [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- An Open Letter from US Researchers in Cryptography and ... [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 4 8 Private Key Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets Part 1 8 What is Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography RSA Encryption Algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Public Key Cryptography Diffie Hellman Key Exchange - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Intro to Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Caesar Cipher Ancient Cryptography - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- 50 top US cyber security experts write open letter calling for end to NSA 'snoop-ops' [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Prominent cryptography and security researchers deplore NSA's surveillance activities [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Obama Stays Silent on Reform of NSA's Crypto Subversion [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography experts sign open letter against NSA surveillance [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- US crypto researchers to NSA: If you must track, track responsibly [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Java Cryptography Architecture (JCA) Overview - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 1 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Cryptography - Part 2 - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- International Journal on Cryptography and Information Security ( IJCIS) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust, Deal With It - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Bitcoin Lowdown: Block Chain Cryptography Trumps Human Trust - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- NSA and GCHQ spoofed LinkedIn to hack Belgian cryptography professor [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Lecture 17: Elliptic Curve Cryptography (ECC) - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Cryptography event - Pravega 2014 - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Lecture 1: Introduction to Cryptography - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- US and UK spy agencies accused of swoop on Belgian cryptography expert [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Conceal: Facebook's new Java APIs for cryptography on Android [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Apps: How To Keep Your Personal Info Private [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Oi, Android devs! Facebook wants your apps to be more secure [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 19: Elgamal Digital Signature - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Lecture 18: Digital Signatures and Security Services - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Cryptography 1. List some of the attacks on the Diffie ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography Breakthrough Could Make Software Unhackable ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography: Secret Coding, Spying, and E-Commerce - Video [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Cryptography - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Public Key Cryptography: RSA Encryption Algorithm - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Is Bitcoin Anonymous? Arvind Narayanan | Princeton University | Real World Cryptography Workshop - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- A Competitive Study of Cryptography Techniques over Block Cipher - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How Quantum Computing Will Change Cryptography [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- REALITY LOST - EXCERPT SIX (QUANTUM CRYPTOGRAPHY) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Introduction to Cryptography of Bitcoin, Explained! - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- [FOSDEM 2014] USE OTR or how we learned to start worrying and love cryptography - Video [Last Updated On: February 18th, 2014] [Originally Added On: February 18th, 2014]
- Reshif's Cryptography Challenge Solution/Walkthrough - Video [Last Updated On: February 20th, 2014] [Originally Added On: February 20th, 2014]
- [DEFCON 19] Steganography and Cryptography 101 - Video [Last Updated On: February 22nd, 2014] [Originally Added On: February 22nd, 2014]
- A Brief Rundown Of The Spying Questions Intel's CEO Won't Answer [Last Updated On: February 25th, 2014] [Originally Added On: February 25th, 2014]
- DEF CON 8 - Jon Erickson - Number Theory Complexity, Theory, Cryptography, and Quantum Computing. - Video [Last Updated On: February 26th, 2014] [Originally Added On: February 26th, 2014]
- Was YOUR iPhone at risk of being hacked? Bug in Apple update left mobiles open to identity theft for up to 18 months ... [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Security researchers urge tech companies to explain their cryptographic choices [Last Updated On: February 27th, 2014] [Originally Added On: February 27th, 2014]
- Apple reveals algorithm behind 'encrypted' iMessages [Last Updated On: February 28th, 2014] [Originally Added On: February 28th, 2014]
- Wiliest Ways to Keep the NSA at Bay [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- How to Pronounce Cryptography - Video [Last Updated On: March 1st, 2014] [Originally Added On: March 1st, 2014]
- cryptography in DNS - Video [Last Updated On: March 3rd, 2014] [Originally Added On: March 3rd, 2014]
- Who is the reclusive billionaire creator of Bitcoin? [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- How to say cryptography in Italian - Video [Last Updated On: March 4th, 2014] [Originally Added On: March 4th, 2014]
- Massive Linux security flaw dwarfs Appleās cryptography problems of just last week [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Security lessons from RSA [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Visual Cryptography - Video [Last Updated On: March 5th, 2014] [Originally Added On: March 5th, 2014]
- Classical Computing Embraces Quantum Ideas [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- Quantum Cryptography Conquers Noise Problem [Last Updated On: March 6th, 2014] [Originally Added On: March 6th, 2014]
- REALITY LOST Bonus scene 4. Quantum cryptography Founding Fathers. - Video [Last Updated On: March 7th, 2014] [Originally Added On: March 7th, 2014]
- Quantum Cryptography: From Theory to Practice - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Forcing Trust: Nonlocal Games and Untrusted-device Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- TrustyCon 2014 - New Frontiers in Cryptography - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- REALITY LOST Bonus scene 3. Christian Kurtsiefer on hacking quantum cryptography. - Video [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- Nerlens Noel Tweets Date for Potential NBA Debut [Last Updated On: March 9th, 2014] [Originally Added On: March 9th, 2014]
- CISSP SG Cryptography - Video [Last Updated On: March 10th, 2014] [Originally Added On: March 10th, 2014]
- More secure communications thanks to quantum physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- New Cryptography Scheme Secured By Quantum Physics [Last Updated On: March 13th, 2014] [Originally Added On: March 13th, 2014]
- History Of Cryptography - Video [Last Updated On: March 14th, 2014] [Originally Added On: March 14th, 2014]
- avc 19 Cryptography x264 - Video [Last Updated On: March 15th, 2014] [Originally Added On: March 15th, 2014]
- Edward Snowden Speaks at SXSW [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- Tor is building an anonymous instant messenger [Last Updated On: April 10th, 2017] [Originally Added On: March 15th, 2014]
- learn cryptography learn the following pkcs refrences - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]
- [Lec-2][Part-2] Shift Cipher - Symmetric ciphers - Video [Last Updated On: March 16th, 2014] [Originally Added On: March 16th, 2014]