News and commentary on organized crime, street crime, white collar crime, cyber crime, sex crime, crime fiction, crime prevention, espionage and terrorism.
Wednesday, March 23, 2016
Chinese National Pleads Guilty To Conspiring To Hack Into U.S. Defense Contractors’ Systems To Steal Sensitive Military Information
The U.S. Justice Department released the below information:
A Chinese national pleaded guilty today to participating in a years-long conspiracy to hack into the computer networks of major U.S. defense contractors, steal sensitive military and export-controlled data and send the stolen data to China.
Su Bin, also known as Stephen Su and Stephen Subin, 50, a citizen and resident of the People’s Republic of China, pleaded guilty before U.S. District Judge Christina A. Snyder of the Central District of California.
The guilty plea was announced by Assistant Attorney General for National Security John P. Carlin, U.S. Attorney Eileen M. Decker of the Central District of California, Assistant Director Jim Trainor of the FBI’s Cyber Division and Assistant Director in Charge David Bowdich of the FBI’s Los Angeles Division.
A criminal complaint filed in 2014 and subsequent indictments filed in Los Angeles charged Su, a China-based businessman in the aviation and aerospace fields, for his role in the criminal conspiracy to steal military technical data, including data relating to the C-17 strategic transport aircraft and certain fighter jets produced for the U.S. military. Su was initially arrested in Canada in July 2014 on a warrant issued in relation to this case. Su ultimately waived extradition and consented to be conveyed to the United States in February 2016.
“Su Bin admitted to playing an important role in a conspiracy, originating in China, to illegally access sensitive military data, including data relating to military aircraft that are indispensable in keeping our military personnel safe,” said Assistant Attorney General Carlin. “This plea sends a strong message that stealing from the United States and our companies has a significant cost; we can and will find these criminals and bring them to justice. The National Security Division remains sharply focused on disrupting cyber threats to the national security, and we will continue to be relentless in our pursuit of those who seek to undermine our security.”
“Protecting our national security is the highest priority of the U.S. Attorney’s Office, and cybercrime represents one of the most serious threats to our national security,” said U.S. Attorney Decker. “The innovative and tireless work of the prosecutors and investigators in this case is a testament to our collective commitment to protecting our nation’s security from all threats. Today’s guilty plea and conviction demonstrate that these criminals can be held accountable no matter where they are located in the world and that we are deeply committed to protecting our sensitive data in order to keep our nation safe.”
“Cyber security is a top priority not only for the FBI but the entire U.S. government,” said Assistant Director Trainor. “Our greatest strength is when we harness our capabilities to work together, and today’s guilty plea demonstrates this. Our adversaries’ capabilities are constantly evolving, and we will remain vigilant in combating the cyber threat.”
“This investigation demonstrates the FBI’s resolve in holding foreign cyber actors accountable regardless of where they reside,” said Assistant Director in Charge Bowdich. “Cybercrime investigators in Los Angeles are among the finest and their efforts toward preserving America's national security in this case should be commended.”
In the plea agreement filed yesterday in the U.S. District Court of the Central District of California, Su admitted to conspiring with two persons in China from October 2008 to March 2014 to gain unauthorized access to protected computer networks in the United States, including computers belonging to the Boeing Company in Orange County, California, to obtain sensitive military information and to export that information illegally from the United States to China.
As part of the conspiracy, Su would e-mail the co-conspirators with guidance regarding what persons, companies and technologies to target during their computer intrusions. One of Su’s co-conspirators would then gain access to information residing on computers of U.S. companies and email Su directory file listings and folders showing the data that the co-conspirator had been able to access. Su then directed his co-conspirator as to which files and folders his co-conspirator should steal. Once the co-conspirator stole the data, including by using techniques to avoid detection when hacking the victim computers, Su translated the contents of certain stolen data from English into Chinese. In addition, Su and his co-conspirators each wrote, revised and emailed reports about the information and technology they had acquired by their hacking activities, including its value, to the final beneficiaries of their hacking activities.
Su’s plea agreement makes clear that the information he and his co-conspirators intentionally stole included data listed on the U.S. Munitions List contained in the International Traffic in Arms Regulations. Su also admitted that he engaged in the crime for the purpose of financial gain and specifically sought to profit from selling the data the he and his co-conspirators illegally acquired.
Su faces a maximum sentence of five years in prison and a fine of $250,000 or twice the gross gain or gross loss resulting from the offense, whichever is greatest. Judge Snyder is scheduled to sentence Su on July 13, 2016.
The case is being investigated by the FBI Los Angeles Field Office’s Cyber Division with assistance from the U.S. Air Force’s Office of Special Investigations.
This case is being prosecuted by Assistant U.S. Attorney Anthony J. Lewis of the Central District of California and Trial Attorney Casey Arrowood and Senior Trial Attorney Robert E. Wallace of the National Security Division’s Counterintelligence and Export Control Section, with support from Lisa Roberts of the Justice Department’s Office of International Affairs.
Paul Davis is a writer who covers crime. He has written extensively about organized crime, cyber crime, street crime, white collar crime, crime fiction, crime prevention, espionage and terrorism. His 'On Crime' column appears weekly in the Washington Times and his 'Crime Beat' column appears in Philadelphia Weekly. He is also a regular contributor to Counterterrorism magazine. His work has also appeared in the Philadelphia Inquirer, the Philadelphia Daily News and other publications. As a writer, he has attended police academy training, gone out on patrol with police officers, accompanied detectives as they worked cases, accompanied narcotics officers on drug raids, observed criminal court proceedings, visited jails and prisons, and covered street riots, mob wars and murder investigations. He has interviewed police chiefs, FBI, DEA and other federal agents, prosecutors, public officials, Navy SEALs and other military special operators, Israeli commandos, British Scotland Yard detectives, CIA officers, journalists, novelists and true crime authors, and Cosa Nostra organized crime bosses. Paul Davis has been a student of crime since he was an aspiring writer growing up in South Philadelphia. He enlisted in the U.S. Navy when he was 17 in 1970. He served aboard the aircraft carrier U.S.S. Kitty Hawk during the Vietnam War and he later served two years aboard the Navy harbor tugboat U.S.S. Saugus at the U.S. floating nuclear submarine base at Holy Loch, Scotland. He went on to do security work as a Defense Department civilian while working part-time as a freelance writer. He became a full-time writer in 2007. You can read his crime columns, crime fiction, book reviews and news and feature articles on this website. You can read his full bio by clicking on the above photo. And you can contact Paul Davis at email@example.com