Chinese National Pleads Guilty In US Defense Contractor Hacking CaseChinese National Pleads Guilty In US Defense Contractor Hacking Case
Su Bin, a Chinese businessman, pleaded guilty before US District Judge for stealing sensitive military information from American defense contractors’ computer networks.
March 28, 2016
A Chinese citizen, Su Bin, 50, has pleaded guilty in US District Court for his involvement in hacking US defense contractors’ computer networks and stealing sensitive data for sale in China.
In the plea agreement filed in the Court of the Central District of California last week, Su, aka Stephen Su and Stephen Subin, confessed to conspiring with two people in China, illegally accessing sensitive information relating to military aircraft, and transferring that to China for financial gain. A 2014 criminal complaint filed against Su Bin describes him as a Chinese businessman in the aviation and aerospace fields. He was charged with conspiring to steal technical data related to US military C-17 strategic transport aircraft and fighter jets.
Su had been arrested in Canada in July 2014, and later consented to sent to the US in February 2016 for the case.
“This plea sends a strong message that stealing from the United States and our companies has a significant cost; we can and will find these criminals and bring them to justice. The National Security Division remains sharply focused on disrupting cyber threats to the national security, and we will continue to be relentless in our pursuit of those who seek to undermine our security,” said US Assistant Attorney General Carlin.
Su Bin will face a maximum of sentence of five years in prison and a fine of $250,000, or double the total profit or loss resulting from the offense, whichever is more. His sentencing is scheduled for July 13, 2016.
For more from the US Department of Justice, see this release.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
AI in Cybersecurity: Using artificial intelligence to mitigate emerging security risks
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage
5 Reasons To Move your PKI Deployment to the Cloud