Sal McCloskey Sal McCloskey is a tech blogger in Los Angeles who (sadly) falls into the stereotype associated with nerds. Yes, he's a Star Trek fan and writes about it on Uberly. His glasses are thick and his allergies are thicker. Despite all that, he's (somehow) married to a beautiful woman and has 4 kids. Find him on Twitter or Facebook,

A Chinese man has been accused of hacking Boeing and Lockheed Martin

1 min read

The US Department of Justice announced late Friday that a Chinese businessman has been charged with hacking into the computer systems of Boeing, Lockheed Martin and other aerospace companies. The alleged hacker, Su Bin, is accused of helping unidentified co-conspirators to identify what to steal from the companies’ networks—including data on the F-22 and F-35 fighter aircraft and the C-17 cargo plane program. Su, also known as Stephen Su, an executive for a Chinese aerospace company with offices in Canada, was arrested by the Royal Canadian Mounted Police in British Columbia on June 28, in cooperation with the FBI.

U.S. authorities have charged a Chinese businessman with hacking into the computer systems of U.S. companies with large defense contracts, including Boeing, to steal data on military projects, including some of its latest fighter jets, officials said Friday. Suspect Su Bin worked with two unnamed Chinese hackers to get the data between 2009 and 2013, and Su attempted to sell some of the information to state-owned Chinese companies, prosecutors said. The three hackers targeted fighter jets such as the F-22 and the F-35 as well as Boeing’s C-17 military cargo aircraft program, according to a criminal complaint filed in U.S. District Court in Los Angeles that was unsealed Thursday. An attorney for Su could not be reached for comment. Su was arrested in Canada on June 28 and remains in custody there, said FBI spokeswoman Laura Eimiller in Los Angeles. He has a bail hearing set for July 18. U.S. Department of Justice spokesman Marc Raimondi said the conspirators are alleged to have accessed the computer networks of U.S. defense contractors without authorization and stolen data related to military aircraft and weapons systems. “We remain deeply concerned about cyber-enabled theft of sensitive information, and we have repeatedly made it clear that the United States will continue using all the tools our government possesses to strengthen cyber security and confront cybercrime,” Raimondi said.

Source
Avatar of Sal McCloskey
Sal McCloskey Sal McCloskey is a tech blogger in Los Angeles who (sadly) falls into the stereotype associated with nerds. Yes, he's a Star Trek fan and writes about it on Uberly. His glasses are thick and his allergies are thicker. Despite all that, he's (somehow) married to a beautiful woman and has 4 kids. Find him on Twitter or Facebook,

Twitter can’t get in trouble for allowing ISIS activity…

Members of ISIS have been using social networks like Twitter to recruit new members and spread their propaganda, and many people feel that Twitter...
Avatar of Louie Baur Louie Baur
1 min read

The EU wants to force streaming services to show…

The dominance of American media across the globe means we don’t have to worry about our culture being drowned out by foreign media, but that...
Avatar of Alfie Joshua Alfie Joshua
55 sec read

A coalition of tech giants have written an open…

Ever since Apple refused to assist the FBI in cracking the San Bernadino terrorist’s iPhone, there’s been a massive debate about encryption in the United States...
Avatar of Chastity Mansfield Chastity Mansfield
1 min read

Leave a Reply

Your email address will not be published. Required fields are marked *