The Department of Justice highlighted two very different but equally consequential criminal matters this week: a jury conviction in Virginia tied to the deletion of U.S. government databases, and a guilty plea in a terrorism case involving an alleged ISIS-inspired plot targeting a Jewish center in Brooklyn. Taken together, the cases show DOJ’s continued focus on cyber-related insider threats and national-security prosecutions with international dimensions.

In the Eastern District of Virginia, federal prosecutors announced that a jury convicted Sohaib Akhter of Alexandria on charges connected to the deletion of U.S. government databases. For legal and compliance professionals, the case is a reminder that cyber enforcement is not limited to outside hackers. DOJ continues to prioritize alleged misuse of access by insiders and individuals with knowledge of sensitive systems, especially where government infrastructure or critical data is involved.

That matters well beyond the public sector. Companies that handle sensitive information, maintain privileged internal systems, or work with federal agencies should expect continued scrutiny of access controls, logging, offboarding practices, and incident response documentation. In litigation, insider-threat cases also tend to generate disputes over forensic preservation, authorization, privilege, and the scope of “damage” under federal criminal statutes and related civil claims.

Separately, DOJ announced that Muhammad Shahzeb Khan pleaded guilty in a terrorism case involving an alleged plot inspired by ISIS and aimed at a Jewish center in Brooklyn. The prosecution, brought in the Eastern District of New York, underscores the government’s sustained emphasis on counterterrorism matters that blend online radicalization, cross-border investigative activity, and protection of religious institutions and other high-risk targets.

For practitioners, the legal significance lies not only in the seriousness of the alleged conduct, but in the investigative architecture behind these cases. National-security and terrorism prosecutions frequently involve digital evidence, international cooperation, intelligence-sensitive issues, and aggressive pretrial litigation over statements, searches, electronic communications, and detention. Defense counsel, prosecutors, and courts alike must navigate evidentiary and procedural questions that can influence parallel regulatory, immigration, employment, and reputational consequences.

For in-house counsel and compliance teams, the combined message is clear: DOJ is treating cyber sabotage and terrorism-related threats as core enforcement priorities, even when the fact patterns differ dramatically. Organizations should review insider-risk protocols, escalation channels, and coordination plans with law enforcement. Litigators should also watch for how these prosecutions shape evidentiary expectations in future criminal and civil matters involving data destruction, system access, and online communications.

As these cases move through sentencing and any follow-on proceedings, they will remain useful markers of where federal prosecutors are investing resources—and what kinds of conduct are most likely to draw a swift and highly public enforcement response.