News and commentary on organized crime, street crime, white collar crime, cyber crime, sex crime, crime fiction, crime prevention, espionage and terrorism.
Friday, July 22, 2016
Chinese National Who Conspired To Hack Into U.S. Defense Contractors’ Systems Sentenced To 46 Months In Federal Prison
The U.S. Justice Department released the below information:
A Chinese national who admitted to participating in a years-long conspiracy that involved Chinese military officers hacking into the computer networks of major U.S. defense contractors in order to steal military technical data was sentenced today to 46 months in federal prison.
Today’s sentencing was announced by Assistant Attorney General for National Security John P. Carlin and U.S. Attorney Eileen M. Decker of the Central District of California.
“Su Bin’s sentence is a just punishment for his admitted role in a conspiracy with hackers from the People's Liberation Army Air Force to illegally access and steal sensitive U.S. military information,” said Assistant Attorney General Carlin. “Su assisted the Chinese military hackers in their efforts to illegally access and steal designs for cutting-edge military aircraft that are indispensable to our national defense. These activities have serious consequences for the national security of our country and the safety of the men and women of our armed services. This prison sentence reinforces our commitment to ensure that hackers, regardless of state affiliation, are held accountable for their criminal conduct.”
“Protecting our national security interests, including sensitive military information, is the Justice Department’s highest priority,” said U.S. Attorney Decker. “Over the course of years, this defendant sought to undermine the national security of the United States by seeking out information that would benefit a foreign government and providing that country with information it had never before seen. The outstanding efforts of the prosecutors and investigators who developed this case demonstrate our commitment to protecting our nation’s security from all threats. As this case shows, criminals can be held accountable no matter where they are located in the world.”
Su Bin, who is also known as Stephen Su and Stephen Subin, 51, a citizen and resident of the People’s Republic of China, was sentenced today by U.S. District Judge Christina A. Snyder of the Central District of California.
Su told his co-conspirators – military officers in China – whom to target, which files to steal and why the information they stole was significant. During the course of the conspiracy, Su and his co-conspirators stole sensitive military and export-controlled data and sent the stolen information to China.
On March 23, Su pleaded guilty to one count of conspiring to gain unauthorized access to a protected computer and to violate the Arms Export Control Act by exporting defense articles on the U.S. Munitions List contained in the International Traffic in Arms Regulations. Su admitted that he conspired with two persons in China from October 2008 to March 2014 to gain unauthorized access to protected computer networks in the United States – including computers belonging to the Boeing Company in Orange County, California – to obtain sensitive military information and to export that information illegally from the United States to China.
A criminal complaint filed in 2014 and subsequent indictments filed in Los Angeles charged Su, a China-based businessman in the aviation and aerospace fields, for his role in the criminal conspiracy to steal military technical data, including data relating to the C-17 strategic transport aircraft and certain fighter jets produced for the U.S. military. Su was initially arrested in Canada in July 2014 on a warrant issued in relation to this case. Su ultimately waived extradition and consented to be conveyed to the United States in February 2016.
Su admitted that as part of the conspiracy, he sent e-mails to his co-conspirators with guidance regarding what persons, companies and technologies to target during their computer intrusions. One of Su’s co-conspirators gained access to information located on computers of U.S. companies, and he emailed Su directory file listings and folders showing the data that the co-conspirator had been able to access. Su then directed his co-conspirator as to which files and folders his co-conspirator should steal. Once the co-conspirator stole the data, using techniques to avoid detection when hacking the victim computers, Su translated the contents of certain stolen data from English into Chinese. In addition, acoording to Su's admissions and the sentencing documents, Su and his co-conspirators each wrote, revised and emailed reports addressed to the Second Department, General Staff Headquarters, Chinese People’s Liberation Army about the information and technology they had acquired by their hacking activities, including its value, to the final beneficiaries of their hacking activities. Su also admitted that he engaged in the crime for the purpose of financial gain and specifically sought to profit from selling the data the he and his conspirators illegally acquired.
The case was investigated by the FBI’s Los Angeles Field Office’s Cyber Division with assistance from the U.S. Air Force Office of Special Investigations. This case was prosecuted by the U.S. Attorney’s Office of the Central District of California’s Terrorism and Export Crimes Section and Trial Attorney Casey Arrowood and Senior Trial Attorney Robert E. Wallace of the National Security Division’s Counterintelligence and Export Control Section, with support from the Justice Department’s Office of International Affairs.
Paul Davis is a writer who covers crime. He has written extensively about organized crime, cyber crime, street crime, white collar crime, crime fiction, crime prevention, espionage and terrorism. His 'On Crime' column appears weekly in the Washington Times and his 'Crime Beat' column appears in Philadelphia Weekly. He is also a regular contributor to Counterterrorism magazine and writes their online "Threatcon" column. Paul Davis' crime fiction appears in American Crime Magazine. His work has also appeared in the Philadelphia Inquirer, the Philadelphia Daily News and other publications. As a writer, he has attended police academy training, gone out on patrol with police officers, accompanied detectives as they worked cases, accompanied narcotics officers on drug raids, observed criminal court proceedings, visited jails and prisons, and covered street riots, mob wars and murder investigations. He has interviewed police chiefs, FBI, DEA and other federal agents, prosecutors, public officials, Navy SEALs, Army Delta, Israeli commandos and other military special operators, military intelligence officers, British Scotland Yard detectives, CIA officers, journalists, novelists and true crime authors, gamblers, crooks, outlaw bikers, and Cosa Nostra organized crime bosses. Paul Davis has been a student of crime since he was an aspiring writer growing up in South Philadelphia. He enlisted in the U.S. Navy when he was 17 in 1970. He served aboard the aircraft carrier U.S.S. Kitty Hawk during the Vietnam War and he later served two years aboard the Navy harbor tugboat U.S.S. Saugus at the U.S. floating nuclear submarine base at Holy Loch, Scotland. He went on to do security work as a Defense Department civilian while working part-time as a freelance writer. From 1991 to 2005 he was a producer and on-air host of "Inside Government," a public affairs interview radio program that aired Sundays on WPEN AM and WMGK FM in the Philadelphia area. You can read Paul Davis' crime columns, crime fiction, book reviews and news and feature articles on this website. You can read his full bio by clicking on the above photo. And you can contact Paul Davis at firstname.lastname@example.org