The former National Security Agency contractor suspected of stealing U.S. hacking tools allegedly was found hoarding two decades’ worth of classified materials. In a Thursday court filing, federal investigators provided new details on their case against 51-year-old Harold Martin, who was arrested in late August. Investigators have seized 50 terabytes of information from Martin, in addition to thousands of pages of documents, the filing said. Among them are classified operational plans against a known enemy of the U.S that Martin had no need to know about. On Wednesday, The New York Times also reported that Martin was found in possession of NSA hacking tools that have recently been put up for sale online. An anonymous group of hackers calling themselves the Shadow Brokers have been tryingto sell the tools since mid-August, but it’s unclear how they obtained them. According to the court filing, investigators also found a document with handwritten notes describing the NSA’s classified computer infrastructure and technical operations. Those notes appear to be written for an “audience outside of the Intelligence Community,” the court filing said. [ ALSO ON CSO: 7 of the most famous spies ] Martin was previously employed at Booz Allen Hamilton, a firm that maintains NSA infrastructure, and he held a top security clearance. Initially, the U.S. Department of Justice said Martin had taken six classified documents produced in 2014. Thursday’s court filing said he had a larger collection of documents dated from 1996 to 2016, many of which were marked with “secret” or “top secret.” U.S. authorities are still reviewing the seized information, but they allege that Martin illegally held documents he had no need to see. “The case against the Defendant thus far is overwhelming,” the filing said. In addition, Martin may have done little to securely store what he allegedly stole. “Many of the marked documents were lying openly in his home office or stored in the backseat and trunk of his vehicle,” the filing said. Investigators didn’t mention finding any direct evidence of Martin leaking the stolen materials to hackers or a foreign government. But the court filing said he easily could have transferred the information over the internet and concealed his online communications. Attorneys for Martin have rejected the allegations that he betrayed the U.S. People who know Martin have said he is deeply patriotic and do not believe he would have given the classified information to another country, according to The New York Times. Martin previously served in the U.S. Navy. However, federal prosecutors want Martin to remain behind bars for fear he could leak the stolen information. “It is readily apparent to every foreign counterintelligence professional and nongovernmental actor that the Defendant has access to highly classified information,” the filing said. Related content news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Regulation Regulation news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software news SpecterOps to use in-house approximation to test for global attack variations The new offering uses atomic tests and in-house approximation in purple team assessment to test all known techniques of an attack. By Shweta Sharma Sep 28, 2023 3 mins Penetration Testing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe