Defense contractor charged with stealing secrets on laptop
IDG News Service - A former engineer with U.S. military contractor L-3 Communications is facing as much as 20 years in prison on charges that he illegally exported military data to China.
Sixing "Steve" Liu was stopped by U.S. Customs and Border Protection officers on Nov. 29, 2010, after flying back from a speaking engagement at a highly technical nanotechnology conference hosted by local universities and Chinese government officials.
Apparently, border agents' suspicions were aroused when the agents found a conference lanyard in his luggage during a secondary inspection at New Jersey's Newark Liberty International Airport. Liu had said he'd been in China to visit family.
"Customs officers found a folder containing multiple pages of technical language, pictures of military weapons systems, and documents written in Chinese," wrote U.S. Federal Bureau of Investigation Special Agent Lisa Lenches-Marrero, in an affidavit listing the charges against Liu. Border guards also found a laptop. After obtaining a search warrant, federal investigators then discovered hundreds of company documents on Liu's computer, including several that contained technical data on guidance and control systems governed by U.S. arms export control laws.
According to his LinkedIn profile, Liu's area of expertise at L-3 Communications was building very small-scale measurement systems using what's called MEMS (micro-electro-mechanical system) technology. MEMS chips are hot right now: They're what Apple's iPad uses to know how it's being moved around by game-players. Liu was using them to build complex aerospace navigation systems, according to his résumé.
L-3 Communications is the sixth-largest defense contractor in the U.S., according to its website.
Liu had downloaded the data found on his computer without his company's knowledge, was presenting at the conference without permission, and had told a co-worker that he was vacationing in Chicago, court records state.
The U.S. Department of Justice described Liu's presentation at the 4th Annual Workshop on Innovation and Commercialization of Micro & Nanotechnology as a "presentation sponsored by the Chinese government." But according to William Parker, founder of biotechnology company Creative MicroSystems Corp., who spoke at the conference in 2009, the event is a legitimate international forum for international researchers, designed to advance understanding of specific aspects of nanotechnology.
In an interview Tuesday, Parker said he was not familiar with Liu's work but was surprised to hear that he went ahead without company approval. "Usually, you have to get clearance to do a talk like this," he said.
Although much of the material on the conference's website was unavailable Tuesday, a cached Web page indicates that the November 2010 event was sponsored by a number of universities and government and scientific agencies, including China's Ministry of Science and Technology.
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you think getting it right from day one is always what matters, you probably haven't been following technology too closely.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Mitigating DDoS Attacks with F5 Technology
- This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while...
- The DDoS Threat Spectrum
- Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Defending Against Denial of Service Attacks
- By utilizing end-user interviews, this whitepaper explores a deeper understanding of DDoS defense plans and reveals the knowledge gaps around the Denial of...
- Strategic Solutions for Government IT
- This paper outlines why F5 is the optimum partner to help achieve the levels of security, performance and availability that are vital to...
- The Six Main Steps To Structured Analogy
- The role of structured analogy software is to automate the data extraction and processing work, provide visualization of the historical context forjudgments and... All Government IT White Papers
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- The Power of the Citrix Mobility Solution, XenMobile Does everything become a smartphone? Or does the smartphone begin to do everything? How can we afford to support BYOD? Rather, how can...
- BYOD Happens: How to Secure Mobility How to navigate the journey of securing mobility, including the BYOD corruption of IT, the top ten mobility strategies, and the mobility management...
- Fighting Fraud Videos: IBM Intelligent Investigation Manager Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both...
- IBM Intelligent Investigation Manager: Online Product Demo Intelligent Investigation Manager optimizes fraud investigation and analysis and it dynamically coordinates and reports on cases, provides analysis and visualization, and enables more...
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 12, 2013.