U.S. charges Chinese intelligence officers for jet engine data hack

Send a link to a friend  Share

[October 31, 2018]  By Sarah N. Lynch and David Shepardson

WASHINGTON (Reuters) - Chinese intelligence officers conspired with hackers and company insiders to break into private companies' computer systems and steal information on a turbo fan engine used in commercial jetliners, according to a U.S. indictment unsealed on Tuesday.

The indictment said that at the time of the hacks, a Chinese-state owned aerospace company was working to develop a comparable engine for use in aircraft manufactured in China and in other countries.

Chinese-made jets, including the C919 and ARJ21, currently use foreign engines but the country has been trying to develop a competitive homegrown alternative.

The 10 people charged conspired to steal sensitive data "that could be used by Chinese entities to build the same or similar engine without incurring substantial research and development expenses," the indictment released by the U.S. Department of Justice said.

It said more than a dozen companies were targeted, but only Capstone Turbine Corp <CPST.O> was identified by name.



The Justice Department said those hacked included a French firm co-developing a turbofan jet engine with a U.S. company.

France's only civil turbofan engine maker, Safran SA <SAF.PA>, co-develops engines with U.S.-based General Electric Co (GE) <GE.N> through their longstanding CFM International partnership, the world's biggest jet engine manufacturer by number of units sold.

The venture's latest engine, known as LEAP, powers the largest category of Airbus SE <AIR.PA> and Boeing Co <BA.N> jets and includes a version for China's new passenger plane, the Commercial Aircraft Corporation of China (COMAC) C919.

A Safran spokesman in China declined to comment and the company's French head office could not be contacted outside normal business hours.

GE declined to comment.

The indictment charges Zha Rong and Chai Meng along with other co-conspirators who worked for the Jiangsu province Ministry of State Security, a unit of the foreign intelligence arm of the Ministry of State Security.

[to top of second column]

It says their efforts to steal sensitive commercial aviation and other data took place from January 2010 through May 2015.

Chinese Foreign Ministry spokesman Lu Kang said the charges were groundless.

"The relevant accusations are pure fiction and totally fabricated," he told reporters in Beijing, without elaborating.

This is the third major corporate espionage-related case involving Chinese intelligence officers brought by the Justice Department since last month.

In late September, a Chinese national who had also enlisted in the U.S. Army Reserve was arrested in Chicago for working for Chinese intelligence to recruit engineers and scientists, including some who worked for U.S. defense contractors.

In October, the Justice Department also announced it had arrested a spy for China's Ministry of State Security on charges of economic espionage and attempting to steal trade secrets from several U.S. aviation and aerospace companies.

In that matter, the FBI said the extradition of Chinese operative Xu Yanjun from Belgium was unprecedented, and the case highlighted the Chinese government's direct control over economic espionage in the United States.

John Demers, the head of the Justice Department's National Security Division, highlighted the pattern of the three cases in a public statement.



"This is just the beginning," he said. "Together with our federal partners, we will redouble our efforts to safeguard America's ingenuity and investment."

(Reporting by Sarah N. Lynch and David Shepardson in Washington; additional reporting by Brenda Goh in Shanghai and Allison Lampert in Montreal; Editing by Grant McCool, Chris Reese and Darren Schuettler)

[© 2018 Thomson Reuters. All rights reserved.]

Copyright 2018 Reuters. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.  Thompson Reuters is solely responsible for this content.

Back to top