What's new

Why did a Chinese spy from BC get less than four years for stealing F-35 secrets?

ashok321

ELITE MEMBER
Joined
Nov 1, 2010
Messages
17,942
Reaction score
4
Country
Canada
Location
Malaysia
http://ottawacitizen.com/news/natio...ess-than-four-years-for-stealing-f-35-secrets


an-f-35-arrives-at-it-new-operational-base-wednesday-sept.jpeg



A couple of days ago I wrote an article about a Chinese spy who ran an aerospace firm with an office in British Columbia and who had just been sentenced to jail for stealing confidential information on a U.S. military transport aircraft and the F-35 stealth fighter.

subin.jpg

Photograph of Su Bin

The case of Su Bin came up in court in Los Angeles last week. He had helped two Chinese military hackers in targeting information on the U.S. F-22 and F-35 stealth fighters as well as Boeing’s C-17 transport aircraft.

U.S. prosecutors had Su’s emails linking him to the spy operation. He wrote about the difficulty of getting into Boeing’s computer networks, calling it “painstaking labor and slow groping.”

But the spies hit success, entering a secret network with C-17 data. Some 630,000 files containing C-17 information was obtained, according to the U.S. government.

The theft of information on the C-17 aircraft made “important contributions to our national defense scientific research development,” one of the Chinese military officers wrote in an email intercepted by the U.S.

The spies also obtained the flight test plan for the F-35, prepared by a U.S. defence engineer, and details about training for F-22 pilots for launching missiles.

One of Su’s emails also noted an attempt to collect data on a missile being developed jointly by Russia and India.

Another email, sent by Su in 2009, outlined the names of U.S. aerospace executives that the hackers could target.

At one point Su was facing the potential of 30 years in prison, according to media reports in the U.S.

Instead he got three years and 10 months. Plus a $10,000 fine.

So what happened?

It appears Su made a deal.

In a plea agreement, Su admitted to conspiring with the two hackers in China to gain unauthorized access to computer networks in the U.S. between October 2008 and March 2014.

Su also admitted translating the stolen information, which was then offered to Chinese aviation firms.

Even his final sentence was less than bargained for. According to earlier reports under the plea deal, Su faced a maximum sentence of five years in prison and a fine of $250,000.

“Over the course of years, this defendant sought to undermine the national security of the United States by seeking out information that would benefit a foreign government and providing that country with information it had never before seen,” U.S. prosecutor Eileen Decker said in a statement.

In announcing Su’s plea, Assistant Attorney General for National Security John P. Carlin stated this:

“Su Bin admitted to playing an important role in a conspiracy, originating in China, to illegally access sensitive military data, including data relating to military aircraft that are indispensable in keeping our military personnel safe. This plea sends a strong message that stealing from the United States and our companies has a significant cost; we can and will find these criminals and bring them to justice. The National Security Division remains sharply focused on disrupting cyber threats to the national security, and we will continue to be relentless in our pursuit of those who seek to undermine our security.”

This plea sends a strong message?
 
. .
lol I highly doubt about the unprofessional and irresponsible move made by the Chinese Military Hackers. I have no words for it I mean how come they could communicate on an open channel about something they were about to steal? lol was this story from one of the Hollywood movies? They couldn't find anything on this guy and for the sake of the trust of the Nation they had to punish him as much as possible, and who the hell get punished with $10,000, I once attended the hearing in Australia and that guy was booked for 5 years with $80,000 fine, and his crime was that he was selling ecstasy. Enough with these unbiased, untruthful news. I mean just read out this sentence.
U.S. prosecutors had Su’s emails linking him to the spy operation. He wrote about the difficulty of getting into Boeing’s computer networks, calling it “painstaking labor and slow groping.”
And than this one too,
The theft of information on the C-17 aircraft made “important contributions to our national defense scientific research development,” one of the Chinese military officers wrote in an email intercepted by the U.S.
I don't know where is this world heading to.:o:
 
.
lol I highly doubt about the unprofessional and irresponsible move made by the Chinese Military Hackers. I have no words for it I mean how come they could communicate on an open channel about something they were about to steal? lol was this story from one of the Hollywood movies? They couldn't find anything on this guy and for the sake of the trust of the Nation they had to punish him as much as possible, and who the hell get punished with $10,000, I once attended the hearing in Australia and that guy was booked for 5 years with $80,000 fine, and his crime was that he was selling ecstasy. Enough with these unbiased, untruthful news. I mean just read out this sentence.

It is unprofessional from the alleged hacking to the trial and sentence.

Even Mrs. Clinton manages her e-mail accounts better than this.
 
. . .
lol I highly doubt about the unprofessional and irresponsible move made by the Chinese Military Hackers. I have no words for it I mean how come they could communicate on an open channel about something they were about to steal? lol was this story from one of the Hollywood movies? They couldn't find anything on this guy and for the sake of the trust of the Nation they had to punish him as much as possible, and who the hell get punished with $10,000, I once attended the hearing in Australia and that guy was booked for 5 years with $80,000 fine, and his crime was that he was selling ecstasy. Enough with these unbiased, untruthful news. I mean just read out this sentence.

And than this one too,

I don't know where is this world heading to.:o:

This is what we called "Honey Pot" in computer security

https://en.wikipedia.org/wiki/Honeypot_(computing)

You use some fake information to lure potential hacker in, and then when they try to steal it, it will leave a digital marks on it and you can trace it all the way back to who did it, that is how you identify hacker in place.

The guy is guilty, just read his trial trasncript, he made a deal, that means the US government know who he worked for and those people are probably turned as well, or being kept in the dark.
 
.
lol I highly doubt about the unprofessional and irresponsible move made by the Chinese Military Hackers. I have no words for it I mean how come they could communicate on an open channel about something they were about to steal? lol was this story from one of the Hollywood movies? They couldn't find anything on this guy and for the sake of the trust of the Nation they had to punish him as much as possible, and who the hell get punished with $10,000, I once attended the hearing in Australia and that guy was booked for 5 years with $80,000 fine, and his crime was that he was selling ecstasy. Enough with these unbiased, untruthful news. I mean just read out this sentence.

And than this one too,

I don't know where is this world heading to.:o:

Not to mention that everyone know all companies emails are stored in servers (unless you're Hilary, than it's all wiped out, lol). So why would he use email to communicate ?

Spy? More like a moron who think he's a spy
:lol:
 
.
This is what we called "Honey Pot" in computer security

https://en.wikipedia.org/wiki/Honeypot_(computing)

You use some fake information to lure potential hacker in, and then when they try to steal it, it will leave a digital marks on it and you can trace it all the way back to who did it, that is how you identify hacker in place.

The guy is guilty, just read his trial trasncript, he made a deal, that means the US government know who he worked for and those people are probably turned as well, or being kept in the dark.
finally somone with some sense.... thank you
 
.
finally somone with some sense.... thank you

lol..........and I thought this is quite common......

Or maybe just the other people are not replying for real and just trolling.......I don't know..

By the way, it is common knowledge that data farm do exist, which was to protect the top of the top secret, these data farm does not have internet access, and all communication done either by physical communication or by direct line.

I would have imagine the real F-35 data is in one of these unhackable site.
 
.
lol..........and I thought this is quite common......

Or maybe just the other people are not replying for real and just trolling.......I don't know..

By the way, it is common knowledge that data farm do exist, which was to protect the top of the top secret, these data farm does not have internet access, and all communication done either by physical communication or by direct line.

I would have imagine the real F-35 data is in one of these unhackable site.
they best way to protect your data is to simply take it offline. i would know as common sense would tell me that the original f35 design are in a ofline server farm in the middle of ohio, alaska ,virginia or washington. and they would be deep underground with serveral power redundancies.
 
.
they best way to protect your data is to simply take it offline. i would know as common sense would tell me that the original f35 design are in a ofline server farm in the middle of ohio, alaska ,virginia or washington. and they would be deep underground with serveral power redundancies.

lol, I cannot acknowledge or denied whether or not data farm do exist..........

To be honest, I do not know physically, I had TS/SCI clearance, which means I am one level BELOW to access these data farm. But if this was me, I would have put it in multiple location with redundancy backup, you can hack one of the site physical (Given if you can) but that would do nothing, you can also destroy one of the site, but it won't work either.

But for me, a SCIF is quite secure already, and sometime SCIF do have restricted to no internet connection, or you can only access internet from dedicated computer which connected separately from the others.

Oops, I talked too much :)
 
.
This is what we called "Honey Pot" in computer security

https://en.wikipedia.org/wiki/Honeypot_(computing)

You use some fake information to lure potential hacker in, and then when they try to steal it, it will leave a digital marks on it and you can trace it all the way back to who did it, that is how you identify hacker in place.

The guy is guilty, just read his trial trasncript, he made a deal, that means the US government know who he worked for and those people are probably turned as well, or being kept in the dark.

I know what Honeypoting is mate, the problem is that the Chinese Hackers and more specifically those hackers who are working for Chinese Government are considered one of the best in the world. How do they can make such a mistake, or they aren't aware of the honeypoting? lol at least I cannot trust the worthiness of this news.

Not to mention that everyone know all companies emails are stored in servers (unless you're Hilary, than it's all wiped out, lol). So why would he use email to communicate ?

Spy? More like a moron who think he's a spy
:lol:

Even a 10 years old kid would know that, well guess what that's how US People are mesmerized by the so called CIA, aren't they too stupid, don't you reckon?
 
.
I know what Honeypoting is mate, the problem is that the Chinese Hackers and more specifically those hackers who are working for Chinese Government are considered one of the best in the world. How do they can make such a mistake, or they aren't aware of the honeypoting? lol at least I cannot trust the worthiness of this news.



Even a 10 years old kid would know that, well guess what that's how US People are mesmerized by the so called CIA, aren't they too stupid, don't you reckon?

Yup. Like i read in the past about Chinese Taiwanese American stealing blueprints at ABC company. The blueprint was just happen to be in a hard drive with no password to access it. The man saved the blueprint onto a floppy drive (yes you heard right). A high tech place that uses floppy disk in 2006 is not so high tech. Their secrets are not worth stealing.

Then this alleged Chinese spy put the floppy disk in a duffle bag, through it out the 4th story building . Someone below was there to catch the bag. The perp was caught because he went on a trip to China. Apparently it's illegal for US scientist to travel to China

:lol:
 
.
lol, I cannot acknowledge or denied whether or not data farm do exist..........

To be honest, I do not know physically, I had TS/SCI clearance, which means I am one level BELOW to access these data farm. But if this was me, I would have put it in multiple location with redundancy backup, you can hack one of the site physical (Given if you can) but that would do nothing, you can also destroy one of the site, but it won't work either.

But for me, a SCIF is quite secure already, and sometime SCIF do have restricted to no internet connection, or you can only access internet from dedicated computer which connected separately from the others.

Oops, I talked too much :)
well firstly theres no such thing as secure data, just data thats hard to get at.
you can have long postioned moles who have access to such servers, or you can find the gateway machines and get the data from there providing its a two way exchange .
as for clearences most people can only see the data and thats no good as you cant take pics as they take any electrical device of you and go through multiple checks before your even allowed to go down the lift.
oh as your your first point......... you sound like a politicain... a really bad one
 
.

Pakistan Affairs Latest Posts

Back
Top Bottom