Pages

Friday, July 15, 2016

Chinese National Who Conspired to Hack into U.S. Defense Contractors’ Systems Sentenced to 46 Months in Federal Prison

FOR IMMEDIATE RELEASE
Wednesday, July 13, 2016

Chinese National Who Conspired to

 Hack into U.S. Defense Contractors’

 Systems 

Sentenced to 46 Months in

 Federal Prison


A Chinese national who admitted to participating in a years-long conspiracy that involved Chinese military officers hacking into the computer networks of major U.S. defense contractors in order to steal military technical data was sentenced today to 46 months in federal prison.
Today’s sentencing was announced by Assistant Attorney General for National Security John P. Carlin and U.S. Attorney Eileen M. Decker of the Central District of California.
“Su Bin’s sentence is a just punishment for his admitted role in a conspiracy with hackers from the People's Liberation Army Air Force to illegally access and steal sensitive U.S. military information,” said Assistant Attorney General Carlin.  “Su assisted the Chinese military hackers in their efforts to illegally access and steal designs for cutting-edge military aircraft that are indispensable to our national defense.  These activities have serious consequences for the national security of our country and the safety of the men and women of our armed services.  This prison sentence reinforces our commitment to ensure that hackers, regardless of state affiliation, are held accountable for their criminal conduct.”
“Protecting our national security interests, including sensitive military information, is the Justice Department’s highest priority,” said U.S. Attorney Decker.  “Over the course of years, this defendant sought to undermine the national security of the United States by seeking out information that would benefit a foreign government and providing that country with information it had never before seen.  The outstanding efforts of the prosecutors and investigators who developed this case demonstrate our commitment to protecting our nation’s security from all threats.  As this case shows, criminals can be held accountable no matter where they are located in the world.”
Su Bin, who is also known as Stephen Su and Stephen Subin, 51, a citizen and resident of the People’s Republic of China, was sentenced today by U.S. District Judge Christina A. Snyder of the Central District of California.
Su told his co-conspirators – military officers in China – whom to target, which files to steal and why the information they stole was significant.  During the course of the conspiracy, Su and his co-conspirators stole sensitive military and export-controlled data and sent the stolen information to China.
On March 23, Su pleaded guilty to one count of conspiring to gain unauthorized access to a protected computer and to violate the Arms Export Control Act by exporting defense articles on the U.S. Munitions List contained in the International Traffic in Arms Regulations.  Su admitted that he conspired with two persons in China from October 2008 to March 2014 to gain unauthorized access to protected computer networks in the United States – including computers belonging to the Boeing Company in Orange County, California – to obtain sensitive military information and to export that information illegally from the United States to China.
A criminal complaint filed in 2014 and subsequent indictments filed in Los Angeles charged Su, a China-based businessman in the aviation and aerospace fields, for his role in the criminal conspiracy to steal military technical data, including data relating to the C-17 strategic transport aircraft and certain fighter jets produced for the U.S. military. Su was initially arrested in Canada in July 2014 on a warrant issued in relation to this case. Su ultimately waived extradition and consented to be conveyed to the United States in February 2016.
Su admitted that as part of the conspiracy, he sent e-mails to his co-conspirators with guidance regarding what persons, companies and technologies to target during their computer intrusions. One of Su’s co-conspirators gained access to information located on computers of U.S. companies, and he emailed Su directory file listings and folders showing the data that the co-conspirator had been able to access. Su then directed his co-conspirator as to which files and folders his co-conspirator should steal. Once the co-conspirator stole the data, using techniques to avoid detection when hacking the victim computers, Su translated the contents of certain stolen data from English into Chinese. In addition, acoording to Su's admissions and the sentencing documents, Su and his co-conspirators each wrote, revised and emailed reports addressed to the Second Department, General Staff Headquarters, Chinese People’s Liberation Army about the information and technology they had acquired by their hacking activities, including its value, to the final beneficiaries of their hacking activities. Su also admitted that he engaged in the crime for the purpose of financial gain and specifically sought to profit from selling the data the he and his conspirators illegally acquired.
The case was investigated by the FBI’s Los Angeles Field Office’s Cyber Division with assistance from the U.S. Air Force Office of Special Investigations.  This case was prosecuted by the U.S. Attorney’s Office of the Central District of California’s Terrorism and Export Crimes Section and Trial Attorney Casey Arrowood and Senior Trial Attorney Robert E. Wallace of the National Security Division’s Counterintelligence and Export Control Section, with support from the Justice Department’s Office of International Affairs.

No comments:

Post a Comment

Comments always welcome!