{"id":3239,"date":"2014-05-19T14:54:08","date_gmt":"2014-05-19T21:54:08","guid":{"rendered":"https:\/\/cjnotebook.com\/?p=3239"},"modified":"2014-05-19T17:33:33","modified_gmt":"2014-05-20T00:33:33","slug":"federal-grand-jury-indicts-five-chinese-military-hackers-hacked-corporate-computers","status":"publish","type":"post","link":"https:\/\/cjnotebook.com\/?p=3239","title":{"rendered":"Federal Grand Jury Indicts Five Chinese Military Men Who Hacked Corporate Computers"},"content":{"rendered":"<figure id=\"attachment_3252\" aria-describedby=\"caption-attachment-3252\" style=\"width: 150px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/cjnotebook.com\/federal-grand-jury-indicts-five-chinese-military-hackers-hacked-corporate-computers\/chinese-hacker-wanted-by-fbi\/\" rel=\"attachment wp-att-3252\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3252 size-thumbnail\" src=\"https:\/\/cjnotebook.com\/wp-content\/uploads\/2014\/05\/Chinese-Hacker-Wanted-by-FBI-150x150.jpg\" alt=\"Chinese Hacker Wanted by FBI\" width=\"150\" height=\"150\" \/><\/a><figcaption id=\"caption-attachment-3252\" class=\"wp-caption-text\">Alleged Chinese Military Hacker Wen Xinyu<\/figcaption><\/figure>\n<p><strong>PENNSYLVANIA<\/strong> \u00a0&#8212; A federal grand jury indicted five Chinese military hackers for computer hacking, economic espionage and other offenses aimed at six American victims in the U.S. power, metals and solar products industries, \u00a0the federal government announced today.<\/p>\n<p>The<a title=\"Federal Indictment of Five Chinese Hackers\" href=\"http:\/\/www.justice.gov\/iso\/opa\/resources\/5122014519132358461949.pdf\"> indictment <\/a>alleges that the defendants conspired to hack into American entities, to maintain unauthorized access to their computers and to steal information from those entities that would be useful to their competitors in China, including state-owned enterprises, officials said.<\/p>\n<p>\u201cThis is a case alleging economic espionage by members of the Chinese military and represents the first ever charges against a state actor for this type of hacking,\u201d U.S. Attorney General Eric Holder said at a <a title=\"Attorney General Eric Holder Press Conference on Chinese Hackers\" href=\"http:\/\/www.cbsnews.com\/videos\/eric-holder-announces-spy-charges-against-chinese-military-hackers\/\">press conference<\/a>.<\/p>\n<p>Adding, \u201cThe range of trade secrets and other sensitive business information stolen in this case is significant and demands an aggressive response. Success in the global market place should be based solely on a company\u2019s ability to innovate and compete, not on a sponsor government\u2019s ability to spy and steal business secrets. This Administration will not tolerate actions by any nation that seeks to illegally sabotage American companies and undermine the integrity of fair competition in the operation of the free market.\u201d<\/p>\n<p>Victims \u00a0include:<\/p>\n<ul>\n<li>Westinghouse Electric Co.<\/li>\n<li>\u00a0U.S. subsidiaries of SolarWorld AG<\/li>\n<li>United States Steel Corp.<\/li>\n<li>\u00a0Allegheny Technologies Inc.<\/li>\n<li>\u00a0The United Steel, Paper and Forestry, Rubber, Manufacturing, Energy<\/li>\n<li>Allied Industrial<\/li>\n<li>Service Workers International Union<\/li>\n<li>Alcoa Inc.<\/li>\n<\/ul>\n<p>In some cases, \u00a0the indictment alleges that the conspirators stole trade secrets that would have been particularly beneficial to Chinese companies at the time they were stolen.<\/p>\n<p>In other cases, it alleges, the conspirators also stole sensitive, internal communications that would provide a competitor, or an adversary in litigation, with insight into the strategy and vulnerabilities of the American entity.<\/p>\n<p>\u201cFor too long, the Chinese government has blatantly sought to use cyber espionage to obtain economic advantage for its state-owned industries,\u201d said FBI Director James B. Comey. \u201cThe indictment announced today is an important step. But there are many more victims, and there is much more to be done. With our unique criminal and national security authorities, we will continue to use all legal tools at our disposal to counter cyber espionage from all sources.\u201d<\/p>\n<p>Those indicted are <strong>Wang Dong, Sun Kailiang, Wen Xinyu, Huang Zhenyu<\/strong>, and <strong>Gu Chunhui,<\/strong> who were officers in Unit 61398 of the Third Department of the Chinese People\u2019s Liberation Army.<\/p>\n<p>In response to the charges, <a title=\"New York Times Report on Chinese Hackers\" href=\"http:\/\/www.nytimes.com\/2014\/05\/20\/us\/us-to-charge-chinese-workers-with-cyberspying.html?hpw&amp;rref=us&amp;_r=0\">a New York Times report<\/a> states that the Chinese government said that its military had never been involved in stealing trade secrets.<\/p>\n<p>\u201cThe U.S., fabricating facts and using so-called stealing network secrets as an excuse, announced indictments against five Chinese military officers,\u201d the Chinese Foreign Ministry said in a statement. \u201cThis is a serious violation of basic norms of international relations and damages Sino-U.S. cooperation and mutual trust.\u201d China has \u201clodged a protest\u201d with the United States and \u201curges the U.S. to immediately correct its error and revoke its so-called indictment,\u201d it added.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PENNSYLVANIA \u00a0&#8212; A federal grand jury indicted five Chinese military hackers for computer hacking, economic espionage and other offenses aimed at six American victims in the U.S. power, metals and solar products&#8230;<\/p>\n","protected":false},"author":1,"featured_media":3252,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,16],"tags":[499,500],"class_list":["post-3239","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-courts","category-home-main-slider","tag-c","tag-chinese-hackers"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Federal Grand Jury Indicts Five Chinese Military Hackers<\/title>\n<meta name=\"description\" content=\"A federal grand jury indicted five Chinese Military Hackers who Hacked Corporate Computers\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cjnotebook.com\/?p=3239\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Federal Grand Jury Indicts Five Chinese Military Hackers\" \/>\n<meta property=\"og:description\" content=\"A federal grand jury indicted five Chinese Military Hackers who Hacked Corporate Computers\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cjnotebook.com\/?p=3239\" \/>\n<meta property=\"og:site_name\" content=\"American Justice Notebook\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/AmericanJusticeNotebook\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-19T21:54:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-05-20T00:33:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cjnotebook.com\/wp-content\/uploads\/2014\/05\/Chinese-Hacker-Wanted-by-FBI.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"636\" \/>\n\t<meta property=\"og:image:height\" content=\"477\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Raul\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Raul\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cjnotebook.com\\\/?p=3239#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cjnotebook.com\\\/?p=3239\"},\"author\":{\"name\":\"Raul\",\"@id\":\"https:\\\/\\\/cjnotebook.com\\\/#\\\/schema\\\/person\\\/f5521baddca77b521f012298775186c0\"},\"headline\":\"Federal Grand Jury Indicts Five Chinese Military Men Who Hacked Corporate Computers\",\"datePublished\":\"2014-05-19T21:54:08+00:00\",\"dateModified\":\"2014-05-20T00:33:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cjnotebook.com\\\/?p=3239\"},\"wordCount\":529,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cjnotebook.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cjnotebook.com\\\/?p=3239#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cjnotebook.com\\\/wp-content\\\/uploads\\\/2014\\\/05\\\/Chinese-Hacker-Wanted-by-FBI.jpg\",\"keywords\":[\"C\",\"Chinese Hackers\"],\"articleSection\":[\"Courts\",\"Home Main Slider\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cjnotebook.com\\\/?p=3239#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cjnotebook.com\\\/?p=3239\",\"url\":\"https:\\\/\\\/cjnotebook.com\\\/?p=3239\",\"name\":\"Federal Grand Jury Indicts Five Chinese Military Hackers\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cjnotebook.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cjnotebook.com\\\/?p=3239#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cjnotebook.com\\\/?p=3239#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cjnotebook.com\\\/wp-content\\\/uploads\\\/2014\\\/05\\\/Chinese-Hacker-Wanted-by-FBI.jpg\",\"datePublished\":\"2014-05-19T21:54:08+00:00\",\"dateModified\":\"2014-05-20T00:33:33+00:00\",\"description\":\"A federal grand jury indicted five Chinese Military Hackers who Hacked Corporate Computers\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cjnotebook.com\\\/?p=3239\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cjnotebook.com\\\/?p=3239#primaryimage\",\"url\":\"https:\\\/\\\/cjnotebook.com\\\/wp-content\\\/uploads\\\/2014\\\/05\\\/Chinese-Hacker-Wanted-by-FBI.jpg\",\"contentUrl\":\"https:\\\/\\\/cjnotebook.com\\\/wp-content\\\/uploads\\\/2014\\\/05\\\/Chinese-Hacker-Wanted-by-FBI.jpg\",\"width\":636,\"height\":477},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cjnotebook.com\\\/#website\",\"url\":\"https:\\\/\\\/cjnotebook.com\\\/\",\"name\":\"American Justice Notebook\",\"description\":\"&quot;Our liberty depends on the freedom of the press, and that cannot be limited without being lost.&quot; \u2014  Thomas Jefferson\",\"publisher\":{\"@id\":\"https:\\\/\\\/cjnotebook.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cjnotebook.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cjnotebook.com\\\/#organization\",\"name\":\"American Justice Notebook\",\"url\":\"https:\\\/\\\/cjnotebook.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cjnotebook.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cjnotebook.com\\\/wp-content\\\/uploads\\\/2014\\\/07\\\/Justice-Scales.jpg\",\"contentUrl\":\"https:\\\/\\\/cjnotebook.com\\\/wp-content\\\/uploads\\\/2014\\\/07\\\/Justice-Scales.jpg\",\"width\":675,\"height\":231,\"caption\":\"American Justice Notebook\"},\"image\":{\"@id\":\"https:\\\/\\\/cjnotebook.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/AmericanJusticeNotebook\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cjnotebook.com\\\/#\\\/schema\\\/person\\\/f5521baddca77b521f012298775186c0\",\"name\":\"Raul\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c7f80bd073aca2abc2fc18e390e13d00b72d9d3a81bca4fd53e3567b02efee6f?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c7f80bd073aca2abc2fc18e390e13d00b72d9d3a81bca4fd53e3567b02efee6f?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c7f80bd073aca2abc2fc18e390e13d00b72d9d3a81bca4fd53e3567b02efee6f?s=96&r=g\",\"caption\":\"Raul\"},\"description\":\"Raul Hernandez is a former journalist. He has worked as a newspaper reporter for more than 30 years at the El Paso Herald-Post, El Paso Times, Press Enterprise in Riverside, California and the Ventura County Star in California. He was a court reporter for more than 20 years.\",\"sameAs\":[\"https:\\\/\\\/cjnotebook.com\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Federal Grand Jury Indicts Five Chinese Military Hackers","description":"A federal grand jury indicted five Chinese Military Hackers who Hacked Corporate Computers","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cjnotebook.com\/?p=3239","og_locale":"en_US","og_type":"article","og_title":"Federal Grand Jury Indicts Five Chinese Military Hackers","og_description":"A federal grand jury indicted five Chinese Military Hackers who Hacked Corporate Computers","og_url":"https:\/\/cjnotebook.com\/?p=3239","og_site_name":"American Justice Notebook","article_publisher":"https:\/\/www.facebook.com\/AmericanJusticeNotebook","article_published_time":"2014-05-19T21:54:08+00:00","article_modified_time":"2014-05-20T00:33:33+00:00","og_image":[{"width":636,"height":477,"url":"https:\/\/cjnotebook.com\/wp-content\/uploads\/2014\/05\/Chinese-Hacker-Wanted-by-FBI.jpg","type":"image\/jpeg"}],"author":"Raul","twitter_misc":{"Written by":"Raul","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cjnotebook.com\/?p=3239#article","isPartOf":{"@id":"https:\/\/cjnotebook.com\/?p=3239"},"author":{"name":"Raul","@id":"https:\/\/cjnotebook.com\/#\/schema\/person\/f5521baddca77b521f012298775186c0"},"headline":"Federal Grand Jury Indicts Five Chinese Military Men Who Hacked Corporate Computers","datePublished":"2014-05-19T21:54:08+00:00","dateModified":"2014-05-20T00:33:33+00:00","mainEntityOfPage":{"@id":"https:\/\/cjnotebook.com\/?p=3239"},"wordCount":529,"commentCount":0,"publisher":{"@id":"https:\/\/cjnotebook.com\/#organization"},"image":{"@id":"https:\/\/cjnotebook.com\/?p=3239#primaryimage"},"thumbnailUrl":"https:\/\/cjnotebook.com\/wp-content\/uploads\/2014\/05\/Chinese-Hacker-Wanted-by-FBI.jpg","keywords":["C","Chinese Hackers"],"articleSection":["Courts","Home Main Slider"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cjnotebook.com\/?p=3239#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cjnotebook.com\/?p=3239","url":"https:\/\/cjnotebook.com\/?p=3239","name":"Federal Grand Jury Indicts Five Chinese Military Hackers","isPartOf":{"@id":"https:\/\/cjnotebook.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cjnotebook.com\/?p=3239#primaryimage"},"image":{"@id":"https:\/\/cjnotebook.com\/?p=3239#primaryimage"},"thumbnailUrl":"https:\/\/cjnotebook.com\/wp-content\/uploads\/2014\/05\/Chinese-Hacker-Wanted-by-FBI.jpg","datePublished":"2014-05-19T21:54:08+00:00","dateModified":"2014-05-20T00:33:33+00:00","description":"A federal grand jury indicted five Chinese Military Hackers who Hacked Corporate Computers","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cjnotebook.com\/?p=3239"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cjnotebook.com\/?p=3239#primaryimage","url":"https:\/\/cjnotebook.com\/wp-content\/uploads\/2014\/05\/Chinese-Hacker-Wanted-by-FBI.jpg","contentUrl":"https:\/\/cjnotebook.com\/wp-content\/uploads\/2014\/05\/Chinese-Hacker-Wanted-by-FBI.jpg","width":636,"height":477},{"@type":"WebSite","@id":"https:\/\/cjnotebook.com\/#website","url":"https:\/\/cjnotebook.com\/","name":"American Justice Notebook","description":"&quot;Our liberty depends on the freedom of the press, and that cannot be limited without being lost.&quot; \u2014  Thomas Jefferson","publisher":{"@id":"https:\/\/cjnotebook.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cjnotebook.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cjnotebook.com\/#organization","name":"American Justice Notebook","url":"https:\/\/cjnotebook.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cjnotebook.com\/#\/schema\/logo\/image\/","url":"https:\/\/cjnotebook.com\/wp-content\/uploads\/2014\/07\/Justice-Scales.jpg","contentUrl":"https:\/\/cjnotebook.com\/wp-content\/uploads\/2014\/07\/Justice-Scales.jpg","width":675,"height":231,"caption":"American Justice Notebook"},"image":{"@id":"https:\/\/cjnotebook.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/AmericanJusticeNotebook"]},{"@type":"Person","@id":"https:\/\/cjnotebook.com\/#\/schema\/person\/f5521baddca77b521f012298775186c0","name":"Raul","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c7f80bd073aca2abc2fc18e390e13d00b72d9d3a81bca4fd53e3567b02efee6f?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c7f80bd073aca2abc2fc18e390e13d00b72d9d3a81bca4fd53e3567b02efee6f?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c7f80bd073aca2abc2fc18e390e13d00b72d9d3a81bca4fd53e3567b02efee6f?s=96&r=g","caption":"Raul"},"description":"Raul Hernandez is a former journalist. He has worked as a newspaper reporter for more than 30 years at the El Paso Herald-Post, El Paso Times, Press Enterprise in Riverside, California and the Ventura County Star in California. He was a court reporter for more than 20 years.","sameAs":["https:\/\/cjnotebook.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/cjnotebook.com\/index.php?rest_route=\/wp\/v2\/posts\/3239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cjnotebook.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cjnotebook.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cjnotebook.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cjnotebook.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3239"}],"version-history":[{"count":16,"href":"https:\/\/cjnotebook.com\/index.php?rest_route=\/wp\/v2\/posts\/3239\/revisions"}],"predecessor-version":[{"id":3260,"href":"https:\/\/cjnotebook.com\/index.php?rest_route=\/wp\/v2\/posts\/3239\/revisions\/3260"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cjnotebook.com\/index.php?rest_route=\/wp\/v2\/media\/3252"}],"wp:attachment":[{"href":"https:\/\/cjnotebook.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cjnotebook.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cjnotebook.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}