Retired Army Colonel’s Classified Leak for Romance Results in Two-Year Sentence

By Matthias Binder
Former Army Colonel sentenced to 2 years for sending secret classified battle plans to woo woman (Featured Image)

A Veteran’s Trusted Role Shattered (Image Credits: Nypost.com)

Tampa, Florida — A former high-ranking military contractor crossed a dangerous line when he shared sensitive operational details with a woman he hoped to impress.

A Veteran’s Trusted Role Shattered

Kevin Charles Luke built a 37-year career in the Army, retiring as a colonel in 2018 after serving as a decorated combat veteran.[1][2]

He suffered injuries from a bomb blast during Operation Iraqi Freedom, leading to traumatic brain injury and post-traumatic stress disorder. Despite these challenges, colleagues described him as loyal and capable, with one combat peer stating he would trust Luke with his life.[2]

After retirement, Luke continued his service as a civilian contractor at U.S. Central Command headquarters on MacDill Air Force Base. His position granted him top secret clearance, placing him at the heart of planning for Middle East operations.[1]

The Moment of Reckless Disclosure

On October 1, 2024, Luke photographed a classified email from his work computer and sent it via text to a woman he met online.[2]

The document, marked “SECRET//REL TO USA, FVEY,” outlined a forthcoming military operation, including its date, number of targets, and battle details. It arrived just days before Central Command airstrikes in Yemen targeting Houthi militants as part of Operation Poseidon Archer.[1][2]

Luke captioned the image: “Sent to my boss earlier… Gives you a peek at what I do for a living.” Prosecutors later emphasized that the disclosure risked U.S. service members and allies in the Five Eyes intelligence-sharing network.[2]

Discovery Sparks Federal Probe

The relationship ended roughly two months after the incident. The woman then reported Luke to authorities, prompting a search of his Parrish home.[1]

Investigators uncovered additional unauthorized classified materials, including four emails and a notebook labeled “secret.” The Air Force Office of Special Investigations and FBI led the case.[2]

Luke pleaded guilty in November 2025 to one count of unauthorized communication of national defense information. No evidence emerged of financial gain, foreign ties, or further dissemination.[1]

Sentencing Balances Service and Betrayal

U.S. District Judge James D. Moody Jr. imposed a two-year prison term on February 10, 2026, along with one year of supervised release and a mental health evaluation. Prosecutors had sought four years.[2]

In court, a tearful Luke accepted responsibility: “I stand before you accepting full responsibility for my actions… What I did was wrong. I violated the trust placed in me and, sir, I am ashamed of that.”[1]

His attorney, Mark O’Brien, called it a “moment of bad judgment” with deep regret, drawing parallels to former CIA Director David Petraeus’ case. Assistant U.S. Attorney Lindsey Schmidt countered that Luke had betrayed long-placed trust.[2]

Key Takeaways

  • Even a single lapse can end a distinguished career and endanger operations.
  • Clearance holders must recognize personal devices amplify risks.
  • Courts weigh military service against national security breaches.

This case underscores the thin line between professional pride and peril in handling secrets. As clearance violations rise amid digital dating, veterans and contractors face heightened scrutiny. What safeguards would you implement to prevent such breaches? Tell us in the comments.

Exit mobile version