National Guardsman Charged with Attempting to Send Photos of Sensitive Military Technology to Russia
Arrest in New Mexico Sparks Federal Espionage Case
Federal authorities have charged a 28-year-old National Guardsman from Alamogordo, New Mexico, with attempting to transmit photographs and equipment related to sensitive U.S. military technology to Russia. Canyon Anthony Amarys was arrested on October 28, 2025, after a months-long undercover operation coordinated by the FBI and the Department of Justice. Prosecutors allege that Amarys knowingly tried to violate the Export Control Reform Act by attempting to send restricted materials overseas.
He was taken into custody in Kansas and made his initial appearance in the U.S. District Court for the District of Kansas on Thursday. If convicted, he faces a maximum penalty of 20 years in prison and a fine of up to $1 million. The arrest represents one of the most serious domestic espionage-related cases involving an active member of the National Guard in years.
Undercover Operation Exposes Alleged Espionage Attempt
According to federal court filings, the investigation began in early 2025 when Amarys came under surveillance following suspicious online communications. Authorities allege that in February 2025, he met an undercover FBI employee posing as a Russian intelligence operative at a hotel in Overland Park, Kansas. During this meeting, prosecutors say Amarys signed a one-page document that established what he believed to be a covert partnership with a Russian intelligence service.
The undercover operative provided Amarys with several thousand dollars in cash, instructing him to acquire a Garmin GTR-205 helicopter radio and to capture detailed photographs of U.S. military equipment within restricted areas of Fort Riley, Kansas. Shortly thereafter, investigators say Amarys visited Fort Riley, took multiple images of military devices and systems, and communicated electronically with the undercover operative to confirm his progress.
Unbeknownst to him, every step was monitored, recorded, and documented as part of the sting operation.
Attempt to Export Restricted Technology Thwarted
Court documents allege that in March 2025, Amarys purchased the assigned helicopter radio and took deliberate steps to ship it to Romania. Authorities contend this was a cover story to obscure the deviceâs intended final destinationâRussia. Surveillance footage and intercepted communications showed Amarys packaging the radio carefully before handing it over at a USPS facility in Junction City, Kansas.
Before he completed the shipment, Amarys engaged in a recorded discussion in which he acknowledged understanding that the export was illegal under U.S. law. He also admitted to studying federal export control regulations prior to his meeting in February, a detail prosecutors say demonstrates knowledge and intent.
The FBI intercepted the package before it could leave the United States. Investigators seized the radio and confirmed it fell under restricted export classification, meaning it could not legally be transferred to a foreign country without specific government authorization.
The Export Control Reform Act: Protecting National Security
The Export Control Reform Act (ECRA), enacted in 2018, gives the U.S. government broad authority to regulate the export of goods, software, and technology that could pose a risk to national security. It covers items ranging from microelectronics and aviation systems to advanced communication equipment and defense technologies. Under federal law, violations involving sensitive military items carry severe criminal and civil penalties.
Amarysâs alleged attempt involved hardware commonly used in helicopter communicationsâa system that falls within the list of controlled technologies due to its potential use in both civilian and military applications. Exporting such equipment without authorization presents a direct security threat, as it could allow adversarial governments to reverse-engineer or replicate U.S. designs.
Federal prosecutors regularly rely on the ECRA to prosecute cases involving both willful espionage attempts and negligent technology transfers. The Department of Justice has stated that these measures aim to preserve the technological superiority of U.S. defense systems and prevent foreign intelligence services from gaining access to classified or strategic assets.
Regional Context: Kansas and Fort Rileyâs Strategic Role
Fort Riley, located between Junction City and Manhattan, Kansas, serves as one of the most significant Army installations in the Midwest. The base houses the 1st Infantry Division, known historically as âThe Big Red One,â and is used for large-scale training exercises involving modern technology, armored combat vehicles, and aviation equipment. Because of the nature of activities conducted at Fort Riley, the base is considered a critical part of the United Statesâ operational readiness.
Federal officials emphasize that breaches involving photography or data sharing from such installations could expose military tactics, technological specifications, or logistical strengths. The alleged actions by Amarys, though limited to a single individual, highlight broader concerns about internal security risks within U.S. defense facilities.
Kansas, positioned geographically in the heartland of the country, has long served as a secure and remote environment for training and logistical planning. The region has been relatively free from espionage cases compared to coastal states with major defense industries. This case now draws unusual attention to an area traditionally seen as insulated from such threats.
National Guard Members and Security Gap Challenges
National Guard members occupy a complex role within the broader defense structure. They balance civilian employment with periodic military service, receiving access to certain defense networks and installations depending on their duties. While most members serve loyally, the decentralized nature of their oversight can present vulnerabilities in safeguarding classified or restricted information.
Defense analysts note that the alleged actions of Amarys point to growing challenges in monitoring insider threatsâindividuals who hold legitimate credentials but use them in unauthorized ways. In recent years, the Department of Defense has expanded internal monitoring programs to identify behavioral warning signs and digital activity that might indicate espionage or foreign influence attempts.
Historical Parallels and Espionage Patterns
The arrest of Amarys echoes earlier incidents involving servicemembers or contractors attempting to communicate with foreign intelligence services. For instance, in 2022, a former Army intelligence analyst was convicted of attempting to pass classified documents to China. Another case in 2024 involved a U.S. Navy engineer sentenced for trying to sell submarine-related information.
Experts suggest that while traditional state-sponsored espionage has evolved with digital communications, human intelligence operations remain central to foreign intelligence gathering. Cases like Amarysâs show that personal motivationsâmoney, ideology, or discontentâcan still drive individuals to seek illicit contact with foreign operatives, even when digital detection systems are stringent.
Economic and Diplomatic Impact
Beyond its immediate criminal dimensions, the attempted export of restricted technology carries implications for U.S. defense industries and trade relations. Unauthorized dissemination of military-grade electronics could undermine the global competitiveness of American manufacturers by allowing adversarial nations to replicate or adapt these designs. Such leaks also complicate diplomatic relations, especially when detected in the context of heightened global tension.
In recent months, Washington has reinforced export controls targeting Russia in response to ongoing geopolitical conflicts. These restrictions specifically aim to prevent the transfer of technology that could bolster military capabilities or circumvent international sanctions. An incident like the one alleged in Kansas, though isolated, risks being portrayed by Moscow as evidence of internal instability or inconsistent enforcement of U.S. law.
Defense economists note that counterintelligence operations have increasingly become part of trade security policy. The financial penalties associated with ECRA violationsâincluding fines of up to $1 million per offenseâreflect the high economic value of sensitive technologies and the potential cost of their unauthorized dissemination.
Public and Political Reaction
In Alamogordo, the arrest of a local National Guardsman has generated both shock and concern. Residents describe the tight-knit community as patriotic and closely linked to nearby Holloman Air Force Base, a hub for flight training and defense research. Local officials have expressed confidence in federal authoritiesâ handling of the case while emphasizing that one individualâs actions do not reflect the integrity of the broader Guard.
Across social media platforms, discussions about insider threats and loyalty within military ranks have resurged, highlighting public anxiety over national security in an increasingly complex global environment. While officials have avoided political commentary, some lawmakers have called for improved screening processes and cross-agency coordination to detect susceptibility to foreign influence earlier.
Continuing Investigation and Legal Proceedings
Federal prosecutors have indicated that the investigation into Amarysâs alleged activities remains ongoing, with potential for additional charges or related arrests depending on findings. For now, he remains in federal custody pending further hearings. The government has stressed that the case should serve as a reminder of the consequences of attempting to compromise national security, even in seemingly small acts.
If convicted, Amarys could face decades behind bars under federal export control and espionage statutes. Beyond personal punishment, authorities intend for such prosecutions to act as a deterrent, reinforcing that the transmission of sensitive military data or technologyâwhether physical, photographic, or digitalâwill meet the fullest extent of the law.
Broader Implications for U.S. National Security
The case underscores the enduring sensitivity surrounding military technology and the export control framework designed to protect it. As global tensions persist and state actors seek to exploit insider access or digital vulnerabilities, maintaining stringent oversight within defense institutions remains a top priority for the United States.
For the National Guard, the Department of Defense, and the intelligence community, this latest incident represents both a cautionary tale and an opportunity to strengthen internal safeguards. It reminds the public that espionage in the modern era still depends not only on technology, but on human trustâand the constant vigilance required to protect it.