In a case that blends personal folly with serious national security implications, 62-year-old Kevin Charles Luke—a 37-year combat veteran, retired Army colonel, and post-retirement civilian contractor at U.S. Central Command (CENTCOM)—was sentenced on February 10, 2026, to two years in federal prison.
The crime? In October 2024, while still holding a top secret security clearance and working at MacDill Air Force Base in Tampa, Florida, Luke photographed a classified email he had authored on a secure government system and texted the image to a woman he had recently met online and begun dating.
His accompanying message:
“Sent to my boss earlier. Gives you a peek at what I do for living.”
What he showed her was no ordinary email. Marked SECRET//REL TO USA, FVEY (restricted to the Five Eyes alliance: U.S., U.K., Canada, Australia, New Zealand), it outlined sensitive details of a then-upcoming U.S. military operation: Operation Poseidon Archer—a series of airstrikes against Houthi targets in Yemen in response to their attacks on commercial shipping in the Red Sea.
The shared information reportedly included:
- The planned date of the operation
- The number of targets
- Aspects of the battle plans and objectives
The strikes occurred just days after he sent the photo (on October 1, 2024).
How the Breach Came to Light
The relationship eventually ended. Afterward, the woman—a civilian not affiliated with the military—disclosed the incident to authorities. Federal agents executed a search warrant at Luke’s home roughly two months later, discovering additional classified materials he was not authorized to possess at home: four classified emails and a spiral notebook marked “secret.”
In September 2025, Luke signed a plea agreement. He pleaded guilty in November 2025 to one count of unauthorized communication of information relating to the national defense (under 18 U.S.C. § 793(d)). There was no allegation of espionage, foreign government involvement, financial motive, or intent to harm the United States—making this a case of unauthorized disclosure rather than treason or selling secrets.
Sentencing: Balancing Service and Seriousness
On February 10, 2026, in Tampa federal court, U.S. District Judge James Moody sentenced Luke to:
- 2 years imprisonment
- 1 year of probationary supervision following release
- A mental health evaluation
This was below the federal sentencing guideline range of 3–4 years.
During the hearing:
- Luke addressed the court:
“I stand before you accepting full responsibility for my actions. What I did was wrong. I violated the trust placed in me and, sir, I am ashamed of that.”
- Assistant U.S. Attorney Lindsey Schmidt emphasized:
“The United States placed exceptional trust in Luke for a very long time. Luke betrayed that trust.” She argued the disclosure put national secrets at risk and could have endangered lives.
- Defense attorney Mark O’Brien framed it as:
“a tale as old as time. A man trying to impress a woman.” He drew comparisons to the lighter punishment (probation) given to Gen. David Petraeus in 2015 for sharing classified notebooks with his biographer/lover.
Character witnesses—including retired colleagues—described Luke as a man of “unquestionable loyalty,” a “pillar of strength,” and someone they would trust with their lives. One noted the decorated veteran (injured by a bomb in Iraq, later diagnosed with TBI and PTSD) was “shredded inside” by his mistake.
Judge Moody acknowledged the difficulty:
“This is a difficult sentencing,” balancing Luke’s long, honorable service against the gravity of compromising classified operational details.

