Online:
Visits:
Stories:
Profile image
By Voice of Reason
Contributor profile | More stories
Story Views

Now:
Last Hour:
Last 24 Hours:
Total:

Man Who Hacked Plans To U.S. F-35 Fighter For China Gets Absurd Plea Deal (Video)

Friday, March 25, 2016 12:30
% of readers think this story is Fact. Add your two cents.

(Before It's News)

Chinese J-31

The United States 5th Generation Fighter has been marred with technical issues and enormous cost overruns costing the U.S. taxpayers damn near $1 TRILLION dollars, and you won’t believe the ridiculous plea deal the man who hacked the designs for the Chinese was just given by the United States. Under the plea deal, Stephen Subin faces a maximum sentence of five years in prison and a fine of $250,000. Only in America right? Whatever he got for the plans, clearly it was worth it! Documents leaked by Edward Snowden reveal that the NSA requested $1 billion in 2013 to prepare for cyber warfare…

I GUESS OBAMA WAS TOO BUSY SPYING ON AMERICANS TO WORRY ABOUT IT… 

In the following video, China is set to debut its new Shenyang J-31 stealth fighter at the Zhuhai international airshow. Although the fighter’s exact specifications are unknown, it could be a match for the F-22 and the F-35. This sense of the capabilities of the J-31 are largely based on the successes China has had in industrial espionage against US targets. The article below discusses what information the hacker is known to have taken, and what his plea deal is.

Chinese Stealth From Hacked US Designs

SUBSCRIBE TO  THE TOP STORIES OF THE WEEK IN THE NEWSLETTER HERE

WWW.THELASTGREATSTAND.COM

FOR MORE NEWS BY VOICE OF REASON CLICK HERE!

In the second video, you’ll learn that Top Secret documents released by former US intelligence contractor Edward Snowden show Chinese cyber spies stole vast amounts of important military data from the US. The documents suggest that Chinese cyber spies stole key design information about Lockheed Martin’s F-35 Lightning II.

The stolen design information include detailed engine schematics, the cooling of exhaust gases and the radar systems the jet uses for tracking targets. Military aviation experts speculated that China’s fighter jet Shenyang J-31 Falcon Hawk, which closely resembles the F-35 in appearance, has been heavily influenced by the US design, the Sydney Morning Herald reported.

Chinese cyber spies also allegedly stole information related to the B-2 stealth bomber, missile designs, nuclear submarines and other military data from the US, UPI reported. 

FOR MORE NEWS BY VOICE OF REASON CLICK HERE!

FACEBOOK | GOOGLE+TWITTER | PINTEREST | STUMBLE UPON | TUMBLER

Bill Gertz at Free Beacon writes:

A Chinese businessman pleaded guilty this week to conspiracy to hack computer networks of U.S. defense contractors and obtain sensitive data on military aircraft that was passed on to China.

Su Bin, also known as Stephen Su and Stephen Subin, reached a plea deal in U.S. District Court in Los Angeles on Tuesday, following a 2014 criminal complaint and later indictment for illegal computer hacking and theft and transfer of export-controlled data.

The plea deal includes an admission by Su of conspiring with two people in China from October 2008 to March 2014 who broke into U.S. computer networks at Boeing and other defense companies.

The hackers stole large amounts of military information that was supplied to China, according to court documents and a statement by the U.S. Attorney for the Central District of California.

Su

Su Bin

The case is the first successful prosecution of a Chinese hacker for stealing defense secrets. It follows the indictment of five People’s Liberation Army hackers in Pennsylvania in May 2014. The five officers remain in China.

Su was described in court documents as a wealthy Chinese businessman who owned a Beijing aviation technology company called Lode Tech. He was a permanent resident of Canada and owned homes in that country and China.

According to court papers, Su worked with two Chinese hackers who “engaged in clandestine computer and network reconnaissance and intrusion operations.” The two Chinese agents were not identified but were linked to “multiple organizations” in China, according to the court papers.

The two Chinese were listed as unindicted co-conspirators by prosecutors but were not identified by name or agency.

The two Chinese agents emailed Su with stolen defense contractor file directories listing data from U.S. and foreign company networks that China had hacked. Su then advised the two Chinese agents on which specific technologies to target from the companies. The three obtained details on “dozens” of military projects, according to an FBI criminal complaint.

Su also sought to sell the stolen U.S. technology obtained by the China-based hackers to state-owned companies in China.

J31

The operation first gained access to some 630,000 Boeing computer files on the C-17 military transport aircraft technology in early 2009. The C-17 is the U.S. military’s main cargo aircraft. The data included details on the aircraft’s onboard computer.

Other stolen files included data on the F-22 and F-35 aircraft, the military’s most advanced radar-evading stealth fighter jets.

The F-22 data included details of an unspecified “training component” on the stealth jet used to launch missiles.

Other stolen data stolen by the Chinese spies included an unspecified “advanced United States military project” that the three men were attempting to steal blueprints and testing data.

Regarding the F-35, the frontline U.S. jet fighter being developed in both Air Force, Navy, and Marine Corps variants, the Chinese obtained the “Flight Test Plan” for the jet written by a U.S. defense engineer.

According to an FBI agent writing in the criminal complaint, Noel A. Freeman, a report by the spies stated that the stolen data would “allow us to rapidly catch up with U.S. levels” and will allow China to “stand easily on the giant’s shoulders.”

The court case provides additional clues to Chinese cyber theft of U.S. aircraft data disclosed last year in National Security Agency documents made public by former NSA contractor Edward Snowden.

An NSA document states that China obtained more than 50 terabytes—a huge amount of data—from U.S. defense and government networks, including the F-35 radar and engine secrets. The data included numbers and types of F-35 radar modules, and detailed engine schematics for the Northrop Grumman aircraft.

Chinese cyber spies also obtained export-restricted data through defense industrial espionage on the B-2 bomber, F-22, F-35, Space-based Laser, and other weapons.

According to court papers in the Su case, the Chinese cyber espionage operation to obtain U.S. military technology used “hop points” for the cyber attacks in the United States, France, Japan and Hong Kong, and was funded with the Chinese equivalent of more than $500,000.

Court papers did not disclose how the three cyber spies were detected.

WWW.THELASTGREATSTAND.COM

FOR MORE NEWS BY VOICE OF REASON CLICK HERE!

seenlife

SUBSCRIBE TO  THE TOP STORIES OF THE WEEK IN THE NEWSLETTER HERE

However, one court document said the case may be related to the arrest of a Boeing aerospace engineer Keith Gartenlaub, who was arrested in August 2014 on child pornography charges.

A court document in the case said the Su case may be related to the Gartenlaub case because “the cases arise out of the same conspiracy, common scheme, transaction, series of transactions, or events.”

No details were given on the links between the two cases but the Orange County Register reported that Gartenlaub had been the target of Foreign Intelligence Surveillance Court monitoring.

Prosecutors stated during a detention hearing in 2014 that they were concerned Gartenlaub would flee to China, where his wife was born and where the couple owned property and traveled frequently.

Assistant Attorney General John Carlin said in a statement that Su admitted to playing an important role in the China-based conspiracy “to illegally access sensitive military data, including data relating to military aircraft that are indispensable in keeping our military personnel safe.”

“This plea sends a strong message that stealing from the United States and our companies has a significant cost; we can and will find these criminals and bring them to justice,” Carlin said.

U.S. Attorney Eileen M. Decker said in a statement that cyber crime “represents one of the most serious threats to our national security.”

“Today’s guilty plea and conviction demonstrate that these criminals can be held accountable no matter where they are located in the world and that we are deeply committed to protecting our sensitive data in order to keep our nation safe,” Decker said.

“Our adversaries’ capabilities are constantly evolving, and we will remain vigilant in combating the cyber threat,” said FBI Assistant Director Jim Trainor.

Under the plea deal, Su faces a maximum sentence of five years in prison and a fine of $250,000. Sentencing is scheduled for July 13.

PROTECT YOUR FAMILY BEFORE THE CRASH!

STOCK UP ON FOOD SUPPLIES WHILE THERE IS STILL TIME!

Liberty Food

SUBSCRIBE TO  THE TOP STORIES OF THE WEEK IN THE NEWSLETTER HERE

 

Idiot

FOR MORE ON OBAMA’S ONGOING SUCCESS WITH CHINA:  

Chinese Setting the Stage For a Military Invasion of the U.S. West Coast 

Chinese Govts US Nuke Attack Plans Published With Chilling Details…

Report: Chinese Navy’s Fleet Will Outnumber U.S. by 2020

U.S. Military Readiness For War, Competitive Edge WORSENING! 

SPACE: Russia, China and the U.S. All Working on ‘Satellite Killers’

Roadmap To World War 3: “Playtime Between the East and West Is Over”

Amazing Photos Of China’s Newest Stealth Jet

Thanks To Espionage, Chinese Stealth Fighters Could Match The F-35

China Ramping Up J-15 Fighter and HK6 Bomber With Cruise Missiles 

Chinese Submarines Just Reached Another Alarming Milestone

Russia And China Are Sprinting To Catch US’s Advanced Submarine Fleet

As China Deploys Nuclear Submarines, U.S. P-8 Poseidon Jets Snoop 

 

 

 

THE VOICE OF REASON:
Facebook: https://www.facebook.com/LastGreatStand
Google + https://plus.google.com/+Thelastgreatstandconspirator/posts
Twitter https://twitter.com/#!/LastGreatStand
Seen.Life http://www.seen.life/profile/21900069-voice-of-reason
Grassfire http://grassfire.com/users/voiceofreason/profile/
Tea Party Community https://www.teapartycommunity.com/profile-151600/
Right.IS http://right.is/contributor/pages/351/169/bio.html

             

 

 

 

 

 

 

PROTECT YOUR FAMILY BEFORE THE CRASH!

STOCK UP ON FOOD SUPPLIES WHILE THERE IS STILL TIME!

Liberty Food

WWW.THELASTGREATSTAND.COM

FACEBOOK | GOOGLE+TWITTER | PINTEREST | STUMBLE UPON | TUMBLER

seenlife

DONATIONS ACCEPTED VIA PAYPAL TO GET THE RADIO SHOW RUNNING…

AND THEN TO HELP KEEP SPREADING THE MESSAGE!

Small

COMING SOON TO INTERNET RADIO!

STAY TUNED!

WWW.THELASTGREATSTAND.COM

FACEBOOK | GOOGLE+TWITTER | PINTEREST | STUMBLE UPON | TUMBLER

seenlife

Report abuse

Comments

Your Comments
Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

Top Stories
Recent Stories

Register

Newsletter

Email this story
Email this story

If you really want to ban this commenter, please write down the reason:

If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.