A Shocking Breach of Trust
Abouzar Rahmati, a 42-year-old naturalized U.S. citizen from Virginia, sent ripples through the national security community with his guilty plea on April 16, 2025. The former Federal Aviation Administration (FAA) contractor admitted to conspiring to act as an agent of the Iranian government, a role he played for over six years. From 2017 to 2024, Rahmati exploited his access to sensitive aviation data, passing it to Iranian intelligence operatives. The case, announced by the Justice Department, underscores the persistent threat of insider espionage in critical U.S. infrastructure.
Rahmati’s actions weren’t a fleeting lapse. Court documents reveal a calculated effort, beginning with an offer to serve Iran in 2017 through a senior official tied to the country’s Ministry of Intelligence and Security. By December of that year, he was meeting operatives in Iran, agreeing to gather information under the guise of academic research. His targets included the U.S. solar energy industry and, more alarmingly, the FAA’s National Aerospace System, a backbone of aviation safety and operations.
The breach hit hard because Rahmati wasn’t an outsider. Employed by a trusted FAA contractor, he had access to non-public data that could compromise air traffic control systems, radar operations, and more. The case raises urgent questions about how someone with such access could operate undetected for years, passing sensitive materials to a foreign adversary. It’s a wake-up call for an aviation sector already grappling with rising cyber and espionage threats.
How the Scheme Unfolded
Rahmati’s espionage began with the U.S. solar energy industry, a sector critical to national energy security. In 2018, he collected private and open-source materials on solar technology and sent them to an Iranian official linked to the Vice President for Science and Technology. This wasn’t a one-off; it was part of a broader directive from Iranian operatives to gather intelligence on American innovation. The solar industry, already battling intellectual property theft costing over $1 billion annually, faces heightened risks from such targeted espionage.
By 2022, Rahmati’s focus shifted to aviation. Exploiting his role at an FAA contractor, he downloaded 172 gigabytes of sensitive files, including access-controlled documents on radar systems and radio frequencies. He stored this data on removable media, physically transporting it to Iran during a trip in April 2022. There, he handed it over to Iranian officials. He also sent additional aviation-related data, including details on U.S. airports and air traffic control, to his brother in Iran for delivery to intelligence operatives.
The scope of Rahmati’s access is staggering. The National Aerospace System data he compromised could, in the wrong hands, disrupt aviation operations or aid adversaries in mapping U.S. air defenses. While no immediate disruptions were reported, the potential for harm lingers, especially given Iran’s growing cyber aggression and history of targeting critical infrastructure.
A Broader Threat Landscape
Rahmati’s case isn’t isolated. The aviation sector has become a prime target for state-sponsored espionage, with recent breaches at organizations like the International Civil Aviation Organization exposing vulnerabilities in global aviation networks. Cybersecurity experts point to a surge in attacks by actors linked to Iran, China, and others, who exploit interconnected systems to gather intelligence or preposition for future disruptions. The stakes are high: a single breach could compromise air traffic control or avionics, risking lives and economic stability.
Insider threats, like Rahmati, are particularly insidious. In 2024, 83% of organizations reported insider attacks, with costs averaging nearly $5 million per incident. Human error or malice often bypasses even the most advanced defenses, making detection agonizingly slow. The U.S. government has pushed for stronger measures, like Privileged Access Management and continuous monitoring, but gaps remain. Rahmati’s ability to operate for years suggests oversight failures that demand scrutiny.
Beyond aviation, foreign adversaries are intensifying efforts to infiltrate U.S. critical infrastructure. China’s Volt Typhoon campaign, for instance, has pre-positioned cyber tools in energy and telecom networks, while Iran has ramped up influence operations. The U.S. has responded with investment screening and technology bans, but the interconnected nature of global supply chains and legacy systems complicates defenses. Rahmati’s case is a stark reminder that threats often come from within.
Balancing Security and Innovation
The aviation and solar industries, both vital to U.S. economic and security interests, face a delicate balancing act. Robust cybersecurity and counterintelligence are essential, but overly restrictive measures could stifle innovation or burden companies with compliance costs. Industry leaders argue for targeted solutions, like enhanced vetting for sensitive roles and public-private partnerships to share threat intelligence. The FAA, for its part, has pledged to review contractor access protocols in light of Rahmati’s breach.
International cooperation offers another path forward. Alliances like the Five Eyes and the Quad are deepening intelligence-sharing to counter espionage, with initiatives like the Indo-Pacific Partnership for Maritime Domain Awareness extending to aviation security. Yet, disparities in national capabilities and concerns about overreliance on U.S. intelligence pose challenges. Some experts warn that without global standards for aviation cybersecurity, breaches in one country could ripple worldwide.
On the ground, the human toll of espionage can’t be ignored. Workers in aviation and energy, often unaware of the risks, may face heightened scrutiny or job insecurity as companies tighten security. For communities dependent on these industries, the economic ripple effects of disrupted innovation or foreign competition are real. The challenge lies in protecting national interests without alienating the workforce driving these sectors forward.
Looking Ahead
Rahmati faces up to 15 years in prison when sentenced in August 2025, but the fallout from his actions will linger. His guilty plea closes one chapter but opens a broader conversation about safeguarding critical infrastructure. The Justice Department, FBI, and FAA are under pressure to address systemic vulnerabilities, from lax contractor oversight to the slow pace of insider threat detection. Their response will shape public trust in the systems that keep planes aloft and energy flowing.
For now, the case serves as a sobering lesson: national security hinges on vigilance at every level. As adversaries grow bolder, the U.S. must adapt, blending technology, policy, and international collaboration to stay ahead. The skies, and the innovations powering them, depend on it.