[返回军事纵横首页]·[所有跟帖]·[ 回复本帖 ] ·[热门原创] ·[繁體閱讀]·[版主管理]
祖国,我爱你!!!!
送交者: 中间派[★★声望品衔9★★] 于 2020-02-01 15:52 已读 792 次  

中间派的个人频道


Raytheon engineer arrested for taking US missile defense secrets to China 6park.com

7 hours ago
6park.com



6park.com



6park.com

By Justin Rohrlich & Tim Fernholz 6park.com

6park.com

FROM OUR OBSESSION


Because China


Even small changes in China have global effects.

When Wei Sun, a 48-year-old engineer at Raytheon Missile Systems, left for an overseas trip last year, he told the company he planned to bring his company-issued HP EliteBook 840 laptop along.

Sun, a Chinese-born American citizen, had been working at Raytheon, the fourth-largest US defense contractor, for a decade. He held a secret-level security clearance and worked on highly sensitive missile programs used by the US military.

Since Sun’s computer contained large amounts of classified data, Raytheon officials told him that taking it abroad would not only be a violation of company policy, but a serious violation of federal law, as well.
6park.com

6park.com

Sun had access to sensitive missile defense technology.

Sun didn’t listen, according to US prosecutors. While he was out of the country, Sun connected to Raytheon’s internal network on the laptop. He sent an email on Jan. 7, suddenly announcing he was quitting his job after 10 years in order to study and work overseas.

When Sun returned to the United States a week later, he told Raytheon security officials that he had only visited Singapore and the Philippines during his travels. But inconsistent stories about his itinerary led Sun to confess that he traveled to China with the laptop.

A Raytheon lawyer examined the machine, and confirmed it contained technical specifications prohibited from export by the International Traffic in Arms Regulations (ITAR), in addition to security software that is itself export-controlled and requires a special license to take outside the United States.

Sun was arrested by FBI agents the next day. His attorney, Cameron Morgan, did not respond to a request for comment. Raytheon said only that the company “cooperated with this investigation,” declining to elaborate further.

Court documents reviewed by Quartz refer to Sun possessing classified files related to several different air defense systemsdesigned by Raytheon for the US military and sold to American allies and proxies around the world.

The case, which has not been reported until now, is yet another example of China’s increasing efforts to acquire American military technology. The country’s security services have already compromised dozens of crucial US weapons systems, such as the Army’s Terminal High Altitude Area Defense (THAAD) ballistic missile defense system, and the Aegis ballistic missile defense system used by the Navy. In 2018, Chinese hackers stole top-secret plans for a supersonic anti-ship missile being developed by the Navy known as Sea Dragon. The intruders reportedly managed to get massive amounts of sensitive signals and sensor data, in addition to the Navy’s entire electronic warfare library.

The weapons with which Sun worked are “pretty much top-of-the-line American systems,” according to Dean Cheng, a fellow at the Heritage Foundation who studies China’s military capabilities.

The AMRAAM, or Advanced Medium Range Air to Air Missile, is used on US fighter jets like the F-16 and F-22 to destroy other aircraft before they can be seen by anything but radar. It has also been converted into a ground-based air defense system, which may have been Sun’s focus, since prosecutors describe his work as centered on ballistic missile defense.

The documents also say Raytheon employees will provide testimony about the Stinger missile, a “man-portable” air-defense missile that can be fired by troops on the ground, made most famous when the US supplied it to Afghan warlords fighting against occupying Soviet troops.

Perhaps most significant is Sun’s involvement with the Redesigned Kill Vehicle (RKV) program, an effort to replace the interceptor used by US air defense systems to shoot down incoming ballistic missiles.

The Pentagon cancelled the program last year because of technical problems, but information about the project would still be useful to China to understand what the US might do to defend from conventional or nuclear missiles. Missile technology has become central to Beijing’s strategy to deter US power (Quartz member exclusive) in the Pacific, making up for deficiencies and a lack of experience with weapons systems like jet fighters.

China would be eager to learn how to defeat the missiles by understanding the technical details of how they find their targets with radar and other sensors, and how they respond to attempts to jam or distract them, Cheng told Quartz.

China already has its own equivalents of these weapons, so it’s not necessarily seeking to copy US technology. However, as one example, China’s advanced air-to-air missile has never been used in combat, while the AMRAAM has, so its design may offer lessons that China’s defense industrial base has yet to learn.

Cheng said this is “one piece of the larger Chinese espionage picture…we tend to focus on Chinese cyber [but] they have human intelligence, they have people trying to steal examples of it in other countries as well.”

None of the documents shed any light on Sun’s co-conspirators, if any, and it’s not clear if Sun was acting at the behest of Chinese intelligence.

“I can assume that Chinese government agencies are keeping their eye on former citizens who are working in big US companies [like Raytheon],” said Janosh Neumann, a former counterintelligence officer with Russia’s Federal Security Service who now lives in the United States.

Regardless, William Mackie, the lead prosecutor on the Sun case, said someone like Sun can do damage without directly cooperating with anyone. The files Sun allegedly took out of the country could have just as easily been purloined by an adversarial spy service without the engineer’s knowledge.

“If your computer gets left in a hotel room, somebody could image the whole thing and you’d never know it,” Mackie told Quartz. “There’s always the risk of something like that—no different than if somebody took pictures or copies of blueprints or a paper file.”

Legal filings suggest that Sun, who initially pleaded not guilty, is preparing to change his plea to guilty as part of an agreement with the Department of Justice. He is scheduled to appear in court on Feb. 14. 6park.com

喜欢中间派朋友的这个贴子的话, 请点这里投票,“赞”助支持!
[举报反馈]·[ 中间派的个人频道 ]·[-->>参与评论回复]·[用户前期主贴]·[手机扫描浏览分享]·[返回军事纵横首页]
帖子内容是网友自行贴上分享,如果您认为其中内容违规或者侵犯了您的权益,请与我们联系,我们核实后会第一时间删除。

所有跟帖:        ( 主贴楼主有权删除不文明回复,拉黑不受欢迎的用户 )


    用户名:密码:[--注册ID--]

    标 题:

    粗体 斜体 下划线 居中 插入图片插入图片 插入Flash插入Flash动画


         图片上传  Youtube代码器  预览辅助

    打开微信,扫一扫[Scan QR Code]
    进入内容页点击屏幕右上分享按钮

    楼主本栏目热帖推荐:

    >>>>查看更多楼主社区动态...






    [ 留园条例 ] [ 广告服务 ] [ 联系我们 ] [ 个人帐户 ] [ 版主申请 ] [ Contact us ]