Menu
Chinese man indicted over theft of Boeing C-17 secrets

Chinese man indicted over theft of Boeing C-17 secrets

Su Bin is accused of working with two others to steal gigabytes of U.S. defense-related documents

Su Bin

Su Bin

A Chinese man has been indicted for allegedly directing two China-based hackers to infiltrate Boeing and other defense contractors to steal gigabytes of documents describing US military aircraft.

Su Bin, a Chinese national in his late 40s, was indicted in the US District Court for the Central District of California on charges of unauthorized computer access, conspiracy, conspiracy to commit theft of trade secrets and aiding and abetting. He was arrested in Canada in June.

Su allegedly worked with two unnamed and unindicted co-conspirators between 2009 and 2013 to obtain documents related to planes such as the C-17, a cargo aircraft, and the F-22 and F-35 fighter jets, according to the indictment.

Su, who ran a China-based aviation company called Lode Technology, is accused of trying to sell the information to state-owned companies in China and other entities.

Curiously, Su and the co-conspirators in part used free email accounts such as Gmail to communicate, which likely gave law enforcement a broad view into their alleged actions. U.S. prosecutors can obtain such communications with a court order.

Excerpts of the emails were included in an affidavit from FBI Special Agent Noel A. Neeman, which is contained in Su's court file.

An August 2012 email from one of the China-based hackers to the other one describes a painstaking, year-long 2.7 million yuan ($439,000) effort that successfully stole 85 GB of information about the C-17, including electronic cable wiring documents and detailed schematics.

Boeing's network is "extremely complex," the hacker wrote, adding the company has layers of security equipment including firewalls and intrusion detection and prevention systems.

The emails also provided insight into general methods the hackers used. To avoid diplomatic and legal problems, stolen documents were sent to servers in other countries, such as South Korea and Singapore, before being moved to Hong Kong or Macao, according to another email sent from co-conspirator #1 to co-conspirator #2.

From those locales, "the intelligence is always picked up and transferred to China in person," the email said.

Neeman's affidavit said that while the "success and scope" of the operation could have been exaggerated, there was evidence that it was successful "to some degree." His affidavit does not speculate if the co-conspirators are Chinese government employees.

The U.S. and China have traded sharp accusations over hacking in recent months, with each accusing the other of government-sanctioned intrusions.

In May, the U.S. Department of Justice filed a criminal indictment against five members of Chinese Army signal intelligence Unit 61398 with stealing nuclear, solar power and steel trade secrets from six U.S. organizations over eight years. China vehemently denied the accusations.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags U.S. Department of JusticeCriminallegalcybercrime

Featured

Slideshows

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow Electronics introduced Tenable Network Security to local resellers in Sydney last week, officially launching the distributor's latest security partnership across Australia and New Zealand. Representing the first direct distribution agreement locally for Tenable specifically, the deal sees Arrow deliver security solutions directly to mid-market and enterprise channel partners on both sides of the Tasman.

Arrow exclusively introduces Tenable Network Security to A/NZ channel
Examining the changing job scene in the Kiwi channel

Examining the changing job scene in the Kiwi channel

Typically, the New Year brings new opportunities for personnel within the Kiwi channel. 2017 started no differently, with a host of appointments, departures and reshuffles across vendor, distributor and reseller businesses. As a result, the job scene across New Zealand has changed - here’s a run down of who is working where in the year ahead…

Examining the changing job scene in the Kiwi channel
​What are the top 10 tech trends for New Zealand in 2017?

​What are the top 10 tech trends for New Zealand in 2017?

Digital Transformation (DX) has been a critical topic for business over the last few years and IDC is now predicting a step change as DX reaches macroeconomic levels. By 2020 a DX economy will emerge and it will become the core of what New Zealand industries focus on. From the board level through to the C-Suite, Kiwi organisations must be prepared to think and act digital when the DX economy emerges in 2017.

​What are the top 10 tech trends for New Zealand in 2017?
Show Comments