What's new

Raytheon engineer arrested for taking US missile defense secrets to China

F-22Raptor

ELITE MEMBER
Joined
Jun 19, 2014
Messages
16,980
Reaction score
3
Country
United States
Location
United States
When Wei Sun, a 48-year-old engineer at Raytheon Missile Systems, left for an overseas trip last year, he told the company he planned to bring his company-issued HP EliteBook 840 laptop along.

Sun, a Chinese-born American citizen, had been working at Raytheon, the fourth-largest US defense contractor, for a decade. He held a secret-level security clearance and worked on highly sensitive missile programs used by the US military.

Since Sun’s computer contained large amounts of classified data, Raytheon officials told him that taking it abroad would not only be a violation of company policy, but a serious violation of federal law, as well.


Sun didn’t listen, according to US prosecutors. While he was out of the country, Sun connected to Raytheon’s internal network on the laptop. He sent an email on Jan. 7, suddenly announcing he was quitting his job after 10 years in order to study and work overseas.

When Sun returned to the United States a week later, he told Raytheon security officials that he had only visited Singapore and the Philippines during his travels. But inconsistent stories about his itinerary led Sun to confess that he traveled to China with the laptop.

A Raytheon lawyer examined the machine, and confirmed it contained technical specifications prohibited from export by the International Traffic in Arms Regulations (ITAR), in addition to security software that is itself export-controlled and requires a special license to take outside the United States.

Sun was arrested by FBI agents the next day. His attorney, Cameron Morgan, did not respond to a request for comment. Raytheon said only that the company “cooperated with this investigation,” declining to elaborate further.

Court documents reviewed by Quartz refer to Sun possessing classified filesrelated to several different air defense systems designed by Raytheon for the US military and sold to American allies and proxies around the world.

The case, which has not been reported until now, is yet another example of China’s increasing efforts to acquire American military technology. The country’s security services have already compromised dozens of crucial US weapons systems, such as the Army’s Terminal High Altitude Area Defense (THAAD) ballistic missile defense system, and the Aegis ballistic missile defense system used by the Navy. In 2018, Chinese hackers stole top-secret plans for a supersonic anti-ship missile being developed by the Navy known as Sea Dragon. The intruders reportedly managed to get massive amounts of sensitive signals and sensor data, in addition to the Navy’s entire electronic warfare library.

The weapons with which Sun worked are “pretty much top-of-the-line American systems,” according to Dean Cheng, a fellow at the Heritage Foundation who studies China’s military capabilities.

The AMRAAM, or Advanced Medium Range Air to Air Missile, is used on US fighter jets like the F-16 and F-22 to destroy other aircraft before they can be seen by anything but radar. It has also been converted into a ground-based air defense system, which may have been Sun’s focus, since prosecutors describe his work as focusing on ballistic missile defense.

The documents also say Raytheon employees will provide testimony about the Stinger missile, a “man-portable” air-defense missile that can be fired by troops on the ground, made most famous when the US supplied it to Afghan warlords fighting against occupying Soviet troops.

Perhaps most significant is Sun’s involvement with the Redesigned Kill Vehicle (RKV) program, an effort to replace the interceptor used by US air defense systems to shoot down incoming ballistic missiles.

The Pentagon cancelled the program last year because of technical problems, but information about the project would still be useful to China to understand what the US might do to defend from conventional or nuclear missiles. Missile technology has become central to Beijing’s strategy to deter US power(Quartz member exclusive) in the Pacific, making up for deficiencies and a lack of experience with weapons systems like jet fighters.

China would be eager to learn how to defeat the missiles by understanding the technical details of how they find their targets with radar and other sensors, and how they respond to attempts to jam or distract them, Cheng told Quartz.

China already has its own equivalents of these weapons, so it’s not necessarily seeking to copy US technology. However, as one example, China’s advanced air-to-air missile has never been used in combat, while the AMRAAM has, so its design may offer lessons that China’s defense industrial base has yet to learn.

Cheng said this is “one piece of the larger Chinese espionage picture…we tend to focus on Chinese cyber [but] they have human intelligence, they have people trying to steal examples of it in other countries as well.”

None of the documents shed any light on Sun’s co-conspirators, if any, and it’s not clear if Sun was acting at the behest of Chinese intelligence.

“I can assume that Chinese government agencies are keeping their eye on former citizens who are working in big US companies [like Raytheon],” said Janosh Neumann, a former counterintelligence officer with Russia’s Federal Security Service who now lives in the United States.

Regardless, William Mackie, the lead prosecutor on the Sun case, said someone like Sun can do damage without directly cooperating with anyone. The files Sun allegedly took out of the country could have just as easily been purloined by an adversarial spy service without the engineer’s knowledge.

“If your computer gets left in a hotel room, somebody could image the whole thing and you’d never know it,” Mackie told Quartz. “There’s always the risk of something like that—no different than if somebody took pictures or copies of blueprints or a paper file.”

Legal filings suggest that Sun, who initially pleaded not guilty, is preparing to change his plea to guilty as part of an agreement with the Department of Justice. He is scheduled to appear in court on Feb. 14.

https://qz.com/1795127/raytheon-engineer-arrested-for-taking-us-missile-defense-secrets-to-china/

The Chinese frauds at it again. Case after case after case. This just proves how dependent the Chinese are on American scientific and technological know how, and where things stand in this competition. The Chinese are dependent, the US is not. That really says it all.
 
. .
According to Wikipedia, the kill ratio of AIM-120 is 63.15%. Why a PAF pilot will fire multiple AIM-120 C missiles ($400,000 a piece) to hit a "sitting duck" flying inside Pakistani airspace???
Hey you know, with a few Groupon vouchers - we may get a Group Discount on AMRAAM knockoffs which'll be just good as the real deal.

Somewhere in India, the Minister of Defense, Rajnath Singh just learned that now JF-17's will be armed with AMRAAMS (too). His reaction...

Rajnath Singh.jpg
 
.
When Wei Sun, a 48-year-old engineer at Raytheon Missile Systems, left for an overseas trip last year, he told the company he planned to bring his company-issued HP EliteBook 840 laptop along.

Sun, a Chinese-born American citizen, had been working at Raytheon, the fourth-largest US defense contractor, for a decade. He held a secret-level security clearance and worked on highly sensitive missile programs used by the US military.

Since Sun’s computer contained large amounts of classified data, Raytheon officials told him that taking it abroad would not only be a violation of company policy, but a serious violation of federal law, as well.


Sun didn’t listen, according to US prosecutors. While he was out of the country, Sun connected to Raytheon’s internal network on the laptop. He sent an email on Jan. 7, suddenly announcing he was quitting his job after 10 years in order to study and work overseas.

When Sun returned to the United States a week later, he told Raytheon security officials that he had only visited Singapore and the Philippines during his travels. But inconsistent stories about his itinerary led Sun to confess that he traveled to China with the laptop.

A Raytheon lawyer examined the machine, and confirmed it contained technical specifications prohibited from export by the International Traffic in Arms Regulations (ITAR), in addition to security software that is itself export-controlled and requires a special license to take outside the United States.

Sun was arrested by FBI agents the next day. His attorney, Cameron Morgan, did not respond to a request for comment. Raytheon said only that the company “cooperated with this investigation,” declining to elaborate further.

Court documents reviewed by Quartz refer to Sun possessing classified filesrelated to several different air defense systems designed by Raytheon for the US military and sold to American allies and proxies around the world.

The case, which has not been reported until now, is yet another example of China’s increasing efforts to acquire American military technology. The country’s security services have already compromised dozens of crucial US weapons systems, such as the Army’s Terminal High Altitude Area Defense (THAAD) ballistic missile defense system, and the Aegis ballistic missile defense system used by the Navy. In 2018, Chinese hackers stole top-secret plans for a supersonic anti-ship missile being developed by the Navy known as Sea Dragon. The intruders reportedly managed to get massive amounts of sensitive signals and sensor data, in addition to the Navy’s entire electronic warfare library.

The weapons with which Sun worked are “pretty much top-of-the-line American systems,” according to Dean Cheng, a fellow at the Heritage Foundation who studies China’s military capabilities.

The AMRAAM, or Advanced Medium Range Air to Air Missile, is used on US fighter jets like the F-16 and F-22 to destroy other aircraft before they can be seen by anything but radar. It has also been converted into a ground-based air defense system, which may have been Sun’s focus, since prosecutors describe his work as focusing on ballistic missile defense.

The documents also say Raytheon employees will provide testimony about the Stinger missile, a “man-portable” air-defense missile that can be fired by troops on the ground, made most famous when the US supplied it to Afghan warlords fighting against occupying Soviet troops.

Perhaps most significant is Sun’s involvement with the Redesigned Kill Vehicle (RKV) program, an effort to replace the interceptor used by US air defense systems to shoot down incoming ballistic missiles.

The Pentagon cancelled the program last year because of technical problems, but information about the project would still be useful to China to understand what the US might do to defend from conventional or nuclear missiles. Missile technology has become central to Beijing’s strategy to deter US power(Quartz member exclusive) in the Pacific, making up for deficiencies and a lack of experience with weapons systems like jet fighters.

China would be eager to learn how to defeat the missiles by understanding the technical details of how they find their targets with radar and other sensors, and how they respond to attempts to jam or distract them, Cheng told Quartz.

China already has its own equivalents of these weapons, so it’s not necessarily seeking to copy US technology. However, as one example, China’s advanced air-to-air missile has never been used in combat, while the AMRAAM has, so its design may offer lessons that China’s defense industrial base has yet to learn.

Cheng said this is “one piece of the larger Chinese espionage picture…we tend to focus on Chinese cyber [but] they have human intelligence, they have people trying to steal examples of it in other countries as well.”

None of the documents shed any light on Sun’s co-conspirators, if any, and it’s not clear if Sun was acting at the behest of Chinese intelligence.

“I can assume that Chinese government agencies are keeping their eye on former citizens who are working in big US companies [like Raytheon],” said Janosh Neumann, a former counterintelligence officer with Russia’s Federal Security Service who now lives in the United States.

Regardless, William Mackie, the lead prosecutor on the Sun case, said someone like Sun can do damage without directly cooperating with anyone. The files Sun allegedly took out of the country could have just as easily been purloined by an adversarial spy service without the engineer’s knowledge.

“If your computer gets left in a hotel room, somebody could image the whole thing and you’d never know it,” Mackie told Quartz. “There’s always the risk of something like that—no different than if somebody took pictures or copies of blueprints or a paper file.”

Legal filings suggest that Sun, who initially pleaded not guilty, is preparing to change his plea to guilty as part of an agreement with the Department of Justice. He is scheduled to appear in court on Feb. 14.

https://qz.com/1795127/raytheon-engineer-arrested-for-taking-us-missile-defense-secrets-to-china/

The Chinese frauds at it again. Case after case after case. This just proves how dependent the Chinese are on American scientific and technological know how, and where things stand in this competition. The Chinese are dependent, the US is not. That really says it all.
The flipside to that is them being able to take knowledge where they wish without fear of IP reprisals and gaining 5 years worth of R&D in a few months.
 
. .
The flipside to that is them being able to take knowledge where they wish without fear of IP reprisals and gaining 5 years worth of R&D in a few months.

The US and Western countries are the leader while China is the follower. All these cases just prove Chinese dependence on American and Western know how. You don't see the US stealing other countries IP to gain economic and military advantage.
 
. . .
We should care on all chinese people in western country. They are all suspicious. China sends thousands of students/migrants to espionage our secrets. Not only chinese immigrants are suspicious, in wesern country born chinese also.
The thing is, there are 2 major source of migration around the world (hint : both countries have more than a billion people), and both country aim to be world's leading economy one day, and as this competition gets more intense, I think this sort of cases will happen more frequently.

This is a case of people from the other 1 billion plus country doing suspicious activity in a western nation
https://defence.pk/pdf/threads/canadian-company-barred-link-with-indian-intelligence.651849/
 
.
The US and Western countries are the leader while China is the follower. All these cases just prove Chinese dependence on American and Western know how. You don't see the US stealing other countries IP to gain economic and military advantage.

Expect Germany (NSA Affair).
 
.
A bit naive of the chap to wander back to the US thinking he might be let off.
Not just that...the dude announced to the company that he will be taking company issued laptop to China. He kinda dug his own grave. The part of the article that caught my attention is...
"intruders reportedly managed to get massive amounts of sensitive signals and sensor data, in addition to the Navy’s entire electronic warfare library." That is one serious data breach.
 
.
All counties do it if they need to and when they can.
Industrial espionage wasn't invented by the Chinese.
 
. .
When Wei Sun, a 48-year-old engineer at Raytheon Missile Systems, left for an overseas trip last year, he told the company he planned to bring his company-issued HP EliteBook 840 laptop along.

Sun, a Chinese-born American citizen, had been working at Raytheon, the fourth-largest US defense contractor, for a decade. He held a secret-level security clearance and worked on highly sensitive missile programs used by the US military.

Since Sun’s computer contained large amounts of classified data, Raytheon officials told him that taking it abroad would not only be a violation of company policy, but a serious violation of federal law, as well.


Sun didn’t listen, according to US prosecutors. While he was out of the country, Sun connected to Raytheon’s internal network on the laptop. He sent an email on Jan. 7, suddenly announcing he was quitting his job after 10 years in order to study and work overseas.

When Sun returned to the United States a week later, he told Raytheon security officials that he had only visited Singapore and the Philippines during his travels. But inconsistent stories about his itinerary led Sun to confess that he traveled to China with the laptop.

A Raytheon lawyer examined the machine, and confirmed it contained technical specifications prohibited from export by the International Traffic in Arms Regulations (ITAR), in addition to security software that is itself export-controlled and requires a special license to take outside the United States.

Sun was arrested by FBI agents the next day. His attorney, Cameron Morgan, did not respond to a request for comment. Raytheon said only that the company “cooperated with this investigation,” declining to elaborate further.

Court documents reviewed by Quartz refer to Sun possessing classified filesrelated to several different air defense systems designed by Raytheon for the US military and sold to American allies and proxies around the world.

The case, which has not been reported until now, is yet another example of China’s increasing efforts to acquire American military technology. The country’s security services have already compromised dozens of crucial US weapons systems, such as the Army’s Terminal High Altitude Area Defense (THAAD) ballistic missile defense system, and the Aegis ballistic missile defense system used by the Navy. In 2018, Chinese hackers stole top-secret plans for a supersonic anti-ship missile being developed by the Navy known as Sea Dragon. The intruders reportedly managed to get massive amounts of sensitive signals and sensor data, in addition to the Navy’s entire electronic warfare library.

The weapons with which Sun worked are “pretty much top-of-the-line American systems,” according to Dean Cheng, a fellow at the Heritage Foundation who studies China’s military capabilities.

The AMRAAM, or Advanced Medium Range Air to Air Missile, is used on US fighter jets like the F-16 and F-22 to destroy other aircraft before they can be seen by anything but radar. It has also been converted into a ground-based air defense system, which may have been Sun’s focus, since prosecutors describe his work as focusing on ballistic missile defense.

The documents also say Raytheon employees will provide testimony about the Stinger missile, a “man-portable” air-defense missile that can be fired by troops on the ground, made most famous when the US supplied it to Afghan warlords fighting against occupying Soviet troops.

Perhaps most significant is Sun’s involvement with the Redesigned Kill Vehicle (RKV) program, an effort to replace the interceptor used by US air defense systems to shoot down incoming ballistic missiles.

The Pentagon cancelled the program last year because of technical problems, but information about the project would still be useful to China to understand what the US might do to defend from conventional or nuclear missiles. Missile technology has become central to Beijing’s strategy to deter US power(Quartz member exclusive) in the Pacific, making up for deficiencies and a lack of experience with weapons systems like jet fighters.

China would be eager to learn how to defeat the missiles by understanding the technical details of how they find their targets with radar and other sensors, and how they respond to attempts to jam or distract them, Cheng told Quartz.

China already has its own equivalents of these weapons, so it’s not necessarily seeking to copy US technology. However, as one example, China’s advanced air-to-air missile has never been used in combat, while the AMRAAM has, so its design may offer lessons that China’s defense industrial base has yet to learn.

Cheng said this is “one piece of the larger Chinese espionage picture…we tend to focus on Chinese cyber [but] they have human intelligence, they have people trying to steal examples of it in other countries as well.”

None of the documents shed any light on Sun’s co-conspirators, if any, and it’s not clear if Sun was acting at the behest of Chinese intelligence.

“I can assume that Chinese government agencies are keeping their eye on former citizens who are working in big US companies [like Raytheon],” said Janosh Neumann, a former counterintelligence officer with Russia’s Federal Security Service who now lives in the United States.

Regardless, William Mackie, the lead prosecutor on the Sun case, said someone like Sun can do damage without directly cooperating with anyone. The files Sun allegedly took out of the country could have just as easily been purloined by an adversarial spy service without the engineer’s knowledge.

“If your computer gets left in a hotel room, somebody could image the whole thing and you’d never know it,” Mackie told Quartz. “There’s always the risk of something like that—no different than if somebody took pictures or copies of blueprints or a paper file.”

Legal filings suggest that Sun, who initially pleaded not guilty, is preparing to change his plea to guilty as part of an agreement with the Department of Justice. He is scheduled to appear in court on Feb. 14.

https://qz.com/1795127/raytheon-engineer-arrested-for-taking-us-missile-defense-secrets-to-china/

The Chinese frauds at it again. Case after case after case. This just proves how dependent the Chinese are on American scientific and technological know how, and where things stand in this competition. The Chinese are dependent, the US is not. That really says it all.
Sorry man, you guys are digging your own grave if you cannot shield your sensitive assets from espionage.

"The intruders reportedly managed to get massive amounts of sensitive signals and sensor data, in addition to the Navy’s entire electronic warfare library."

Do you understand what this revelation alone entails?

If I was the POTUS, I would have given Lockheed Martin Area 51 treatment after this stupendous level of negligence.
 
Last edited:
. .

Latest posts

Back
Top Bottom