When you think of espionage, what comes to mind? Perhaps you envision covert operatives using encrypted devices, hidden cameras, or sophisticated hacking tools to steal classified information. But what if the reality was far more mundane? What if the tool of choice for a spy or defector was something as ordinary as an office printer?
In a world where we expect spies to use the most cutting-edge technology, the recent case of Gohkan Gun, a Department of Defense (DoD) civilian employee, shows just how easily sensitive information can be exfiltrated using nothing more than a printer and a stack of paper.
Gohkan Gun, a dual citizen of Turkey and the United States, had been employed by the U.S. Air Force for just over a year. During this time, he managed to print and hoard hundreds of classified documents—some marked as Top Secret. On August 9, 2024, Gun’s routine of quietly collecting sensitive information came to an abrupt end when the FBI arrested him outside his Falls Church, Virginia residence. Gun, who was waiting for a rideshare to take him to the airport for an early morning flight to Puerto Vallarta, Mexico, was intercepted before he could leave the country. Instead of a peaceful vacation, he faced the full weight of federal law enforcement.
The FBI’s search of Gun’s home revealed a significant stash of classified materials, carelessly stacked in his dining room and stuffed into a backpack. Among the documents, agents found a detailed list of Gun’s current U.S. government security clearances, raising further questions about his intentions. The sheer volume of documents found—over 3400 pages across 256 individual files—demonstrates how easily someone with legitimate access can accumulate sensitive information over time, even with the most basic of tools.
Gun’s methods were shockingly simple. Each day, he printed out documents, often at the end of his workday, and smuggled them out of the office. He didn’t use complex encryption or secret codes; instead, he rolled the printed documents into wads, placed them in plastic shopping bags, and walked out the door. Despite the primitive nature of his tactics, Gun’s actions represent a serious breach of national security protocols. The FBI believes that as recently as August 7, just two days before his arrest, Gun printed 82 pages of Top Secret material, which were later found in his possession.
The question now is why? Why would Gun, who had earned a Bachelor’s, Master’s, and Ph.D. in engineering and computer science from prestigious U.S. universities, risk everything to collect these documents? Was this a case of espionage, where Gun intended to pass this information to a foreign government? His dual citizenship and his planned trip to Mexico—a country known for harboring foreign intelligence activities certainly raise suspicions. Some speculate that Gun’s trip to Puerto Vallarta was merely a cover, with a more sinister plan to meet with foreign agents in Mexico City. Others wonder if he was attempting to establish a clandestine relationship with a foreign intelligence service, using the materials as a bargaining chip.
However, Gun’s explanation was far less dramatic. He claimed that his trip was purely recreational—a simple fishing trip with friends in the waters of Banderas Bay. Whether this is true or just a convenient cover story, the timing and the evidence found in his possession suggest there may be more to the story than he is willing to admit.
Gun’s arrest is a stark reminder of the persistent threat posed by insiders. Even in an age where cybersecurity is a top priority and technological safeguards are in place, the human element remains a significant vulnerability. The case also highlights the need for constant vigilance and thorough counterintelligence measures, as even the most trusted individuals can pose a threat if their motivations shift or if they see an opportunity to exploit their access to sensitive information.
As Gun’s case unfolds, with more details expected to emerge after his arraignment on August 13, it serves as a potent example of how espionage and insider threats can take unexpected forms.