A former U.S. Transportation Security Administration contractor will serve two years in prison for messing with sensitive government databases used to identify terrorists as they try to enter the U.S. A former U.S. Transportation Security Administration contractor will serve two years in prison for messing with sensitive government databases used to identify terrorists as they try to enter the U.S.James Duchak, 47, pleaded guilty in October to charges that he messed with code at the TSA’s Colorado Springs Operations Center in October 2009. Prosecutors say he tried to damage the TSA’s vetting database, just a week after learning that he was to be let go from his job.Duchak deleted important code, used to properly format the birth dates of people entered into the system.Duchak had been working as a data analyst at the TSA for about five years at the time of the incident. His job was to update TSA servers with data scraped from the government’s terrorist screening database and the United States Marshals Service Warrant Information Network. The former contractor’s replacement — who Duchak was training at the time of the incindent — noticed the code changes, and the TSA shut down the database immediately.Duchak had faced a maximum of 10 years in prison on the charges. In addition to the two-year federal sentence, he must pay $60,000 in restitution to the TSA and serve three years of supervised release following his prison term. He was sentenced Tuesday by Judge David Ebel in the District of Colorado.Robert McMillan covers computer security and general technology breaking news for The IDG News Service. Follow Robert on Twitter at @bobmcmillan. Robert’s e-mail address is robert_mcmillan@idg.com Related content news Amazon’s AWS Control Tower aims to help secure your data’s borders As digital compliance tasks and data sovereignty rules get ever more complicated, Amazon wants automation to help. By Jon Gold Nov 28, 2023 3 mins Regulation Regulation Government news North Korean hackers mix code from proven malware campaigns to avoid detection Threat actors are combining RustBucket loader with KandyKorn payload to effect an evasive and persistent RAT attack. By Shweta Sharma Nov 28, 2023 3 mins Malware feature How a digital design firm navigated its SOC 2 audit L+R's pursuit of SOC 2 certification was complicated by hardware inadequacies and its early adoption of AI, but a successful audit has provided security and business benefits. By Alex Levin Nov 28, 2023 11 mins Certifications Compliance news GE investigates alleged data breach into confidential projects: Report General Electric has confirmed that it has started an investigation into the data breach claims made by IntelBroker. By Shweta Sharma Nov 27, 2023 3 mins Data Breach Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe