Moroccan Military Forum alias FAR-MAROC Royal Moroccan Armed Forces Royal Moroccan Navy Royal Moroccan Air Forces Forces Armées Royales Forces Royales Air Marine Royale Marocaine |
|
| Espionnage industriel et militaire | |
| | Auteur | Message |
---|
Invité Invité
| Sujet: Espionnage industriel et militaire Mar 26 Juin 2012 - 20:28 | |
| Sujet ouvert pour parlé des differente nouvelle sur l'espionage industriel a caractere militaire. les chinois on deja des S300 peu etre qu'il voulai des information sur le S400 et S500 - Citation :
Espionnage: lourdes peines de prison pour deux professeurs russes
Deux scientifiques ont été condamnés mercredi à douze et douze ans et demi de prison pour avoir livré à la Chine des informations secrètes sur des missiles de dernière génération.
par e-mail «Evgueni Afanassiev a été condamné à 12 ans et demi de prison à régime sévère pour haute trahison et Sviatoslav Bobychev à 12 ans de prison pour complicité», a précisé une responsable du tribunal. L'enquête a établi que les scientifiques avaient transmis à la Chine des informations sur le missile stratégique russe de dernière génération Boulava. MM. Afanassiev et Bobychev, professeurs de l'Université technique Baltiïski Voïenmekh de Saint-Pétersbourg, un institut lié au domaine militaire, avaient été arrêtés le 16 mars 2010.
Les deux scientifiques revenaient d'une mission en Chine, où ils s'étaient rendus plusieurs fois en 2009 dans le cadre d'un partenariat avec l'Université polytechnique de Harbin. Selon les services spéciaux russes (FSB), lors de leurs missions en Chine, les scientifiques ont transmis aux services de renseignement chinois des informations secrètes contre rémunération.
Le procès s'est déroulé à huis clos, les professeurs avaient plaidé non coupable. En octobre 2011, le FSB avait annoncé l'arrestation d'un espion chinois qui tentait d'obtenir des informations sur les batteries russes sol-air S-300.. http://www.lessentiel.lu/fr/news/story/14234618 |
| | | Invité Invité
| Sujet: Re: Espionnage industriel et militaire Mar 26 Juin 2012 - 21:13 | |
| - Citation :
- France is top industrial espionage offender
France is worse than China or Russia when it comes to stealing industrial secrets, the head of a German satellite company has been quoted as saying in a WikiLeaks cable made public Tuesday. By News Wires (text)
AFP - France is the top offender when it comes to industrial espionage, and is even worse than China and Russia, the head of a German company was quoted as saying in a leaked US diplomatic cable made public Tuesday. "France is the evil empire (in) stealing technology, and Germany knows this," Berry Smutny, the head of German satellite company OHB Technology, was quoted as saying in the diplomatic note obtained by WikiLeaks and released by the Norwegian daily Aftenposten. Germany, with its decentralised government, was however not willing to do much to counter French industrial espionage activities, he was paraphrased as saying. "Going on at length of his (disdain) of the French, Smutny said French IPR (intellectual property rights) espionage is so bad that the total damage done to the German economy is greater than that inflicted by China or Russia," read the cable, dated November 20, 2009. OHB Technology became known to the general public in January 2010 when it obtained a contract for the construction of several satellites for the Galileo satellite navigation system, a much-delayed European challenger to the American-developed Global Positioning System (GPS). The small German firm won the bid for the contract over Astrium, a subsidiary of pan-European giant EADS. OHB is also the main contractor of the German programme of High Resolution Optical Satellite System (HiROS). "The original plan was for EADS-Astrium in Friedrichshafen, Germany in partnership with the German Space Agency (DLR) to design, build and operate the HiROS," read the cable published by Aftenposten Tuesday. "However, when it became obvious to DLR and German Astrium officials that France, through its influence in EADS-Astrium, would attempt to scuttle the project for fear that HiROS would compete with French commercial satellite business, the decision was made to bring OHB-System on board as the primary contractor," it added. A leaked US cable posted Monday by Aftenposten revealed that behind its commercial facade, the HiROS programme had military aims. Germany, the cables said, was trying to develop an optical observation-based satellite spy system with Washington's help despite objections from France, which is leading pan-European efforts in the field with its Helios satellites. A DLR spokesman denied the information. WikiLeaks has so far only made public around 2,000 of the some 250,000 cables in its possession, in cooperation with publications El Pais, The Guardian, The New York Times, Le Monde and Der Spiegel. The Norwegian daily of reference Aftenposten however said last month it had obtained all the diplomatic documents and would publish stories based on them independently of WikiLeaks' own releases.
http://www.france24.com/en/20110104-france-industrial-espionage-economy-germany-russia-china-business |
| | | Invité Invité
| Sujet: Re: Espionnage industriel et militaire Sam 7 Juil 2012 - 17:49 | |
| Une jolie histoire impliquant Pratt&Whitney Canada et le Z-10 chinois - Citation :
- How US software ended up powering Chinese assault helicopters
Why spy or steal when Western companies will sell you the tech you need?
In 2002, United Technologies Corporation was coming off its most profitable year ever. The various units of UTC, which owns businesses ranging from helicopter manufacturer Sikorsky to Otis (“the world’s leading manufacturer, installer, and maintainer of elevators”), had a net income of $1.9 billion off $27.8 billion in sales in 2001. Pratt & Whitney, the aircraft engine unit of UTC, was poised to bring in billions more from defense contracts, supplying the engines for Lockheed-Martin’s F-22 Raptor, the F-35 Joint Strike Fighter program, and the Boeing C-17 Globemaster III cargo plane.
But there were still opportunities to make even more money. One of the most promising came from Pratt & Whitney’s Canadian subsidiary, which had a plan to open up an entirely new market—China. Large risks were involved, however: the program was shrouded in secrecy, for one. It also involved working with partners who had a reputation for ripping off technology.
And it just happened to be illegal.
Pratt & Whitney Canada wanted to help China's state-owned Aviation Industry Corporation (AVIC) develop the Z-10—China’s first modern attack helicopter, comparable to the US Army’s AH-64 Apache. While operating under the cover story that this was a “dual use” helicopter—built both for civilian and military purposes—at least some people in Pratt & Whitney Canada’s marketing and export team knew exactly what they were getting into.
In an August 2000 e-mail, a Pratt & Whitney Canada marketing employee described the negotiations with AVIC and the China National Aero-Technology Import and Export Corporation (CATIC) this way, according to documents released last week by the US Department of Justice: "Discussions on the P&WC engine for Chinese Z-10 attack helicopter are progressing smoothly. From the attendance at the meetings, it is clear that this is a serious effort and they have a tight timetable.”
“I believe it is important that P&WC management take a clear position on this project," he added. "Aside from legal considerations on export control issues, how will P&WC/UTC respond if US government put some pressure on UTC? P&WC will lose all credibility in China, if P&WC/UTC, as a corporation, backs out of the program at a later date when put under pressure even if a legal basis for export restriction may not exist."
AVIC told P&WC’s representatives that it had been developing its own engine but had run into delays; it was seeking an engine supplier to move on quickly with the development of the Z-10. The long-term goal, the Chinese said, was to equip a civilian version of the helicopter with a “western” engine—creating a huge sales opportunity for P&WC—while eventually putting the AVIC-developed engine into the military version. If P&WC wanted in on the civilian helicopter, it was told, it had to help build the military one. With a potential payoff in the billions and a long-term chunk of China’s growing helicopter market, Pratt & Whitney Canada executives saw this as a calculated risk.
But in the end, the company got the shaft. There never was a civilian variant of the helicopter—the Chinese opted for a larger design and re-opened competition, breaking an exclusive deal with the company. During the project, P&WC also transferred sensitive technology—electronic engine control software—that had a potential impact far beyond the development of China’s first “world class” assault helicopter.
As a result of Pratt & Whitney Canada’s involvement with the Z-10, China gained technology that potentially accelerated the development of the country’s own advanced jet propulsion systems. The software Pratt & Whitney Canada put into the hands of the Chinese Aviation Industry Corporation “can be modified for use in other jet engines," said Mark Bobbi, senior analyst for military aircraft at IHS Janes, in an interview with Ars. “Theoretically, they could use that software and develop new fuel control for the J-10 stealth fighter to improve engine efficiency, for instance.”
This sort of gamble is taken all too often by executives lured by the promise of huge profits. Every year, major multinational technology and aerospace companies—by oversight, by subterfuge of a third party, or by deliberate action—sell technology restricted by US law to countries that are banned from receiving it. While some companies try hard to comply with US International Traffic in Arms Regulations (ITAR), others seem to accept the occasional fines and slaps on the wrist as part of the cost of doing business—and a very profitable business, at that.
Out of (export) control
Much of the US military’s might depends on technology—technology developed at the cost of billions and billions of dollars in taxpayer money. Guarding that technology from potential adversaries can be difficult, especially when the technology gets shot out of the sky or crash lands and ends up in hostile hands. Take, for instance, the stealth unmanned aircraft captured by Iran last December, or the special operations helicopter recovered by Pakistan after the mission to take out Osama Bin Laden last May.
China has made the most out of these sorts of opportunities. In the wake of the Tiananmen Square protests and crackdowns in 1989, Congress explicitly banned the export of any technology with military applications to China. So China's military and its state-owned industries have used whatever means necessary to obtain what they want. The prototype J-20 Chinese stealth fighter unveiled last year, for example, appears to be based on technology recovered from a US F-117 stealth fighter shot down over Serbia in 1999. Chinese intelligence got to examine the stealth helicopter that SEALs flew in to take out Bin Laden. And China has been accused of widespread industrial espionage and cyber attacks on US defense contractors in a quest to unearth technology secrets.
But it doesn't always need such drastic measures—sometimes, US companies will just sell China off-the-shelf technology. (As Vladimir Lenin once put it, “The capitalists will sell us the rope with which we will hang them.” Except the Chinese are now capitalists, too.) The Chinese technology industry has learned to get major tech companies to sell it components which can then be reverse-engineered, copied, or just plain stolen; ask Cisco or American Superconductor.
Governments have a long history of trying to prevent technology companies from trading with countries that have been labeled off-limits. There's also an equally long history of companies working around it.
ITT, for example, owned 25 percent of Focke-Wulfe, the German aircraft manufacturer that supplied fighter aircraft to the World War II-era Luftwaffe; ITT also owned another company that built radios for the Wermacht. In 1983 and 1984, Toshiba sold $17 million worth of computer-driven milling machines to the Soviet Union, allowing the Soviet Navy to create noiseless propellers for its submarine fleet and counter the US’s SOSUS undersea sonar tracking network. Experts put the damages to US military capability at $30 billion.
While ITT actually received compensation for Focke-Wulfe factories that were damaged by Allied bombers, Cold War politics weren't as kind to Toshiba. Two executives were arrested and the company was banned from doing business with Soviet bloc countries for one year—the harshest sanction ever imposed by Japan for a trade violation (at the time, trade with Soviet countries accounted for 12 percent of Toshiba’s high-tech machining business). And the US military banned Toshiba from competing for government business for years.
Even so, many companies remained willing to risk selling technology to the Soviets, and later to the Chinese government. As Hitori Kumagai, the chief Moscow representative of Wako Koeki Trading Company, explained when he informed regulators of Toshiba’s trade violations, “Russian business is [a] delicious, especially dangerous business. Illegal machines contain profits.”
And those profits are even bigger when dealing with China, thanks to its economic strength.
In the case of the Z-10, Pratt & Whitney Canada's export managers were drawn down the rabbit hole by the promise of a big no-compete deal for legitimate business in exchange for a seemingly small bending of the rules.
Sure, it’s civilian!
That journey to the dark side began when P&WC was brought to the table with Chinese aircraft manufacturers by the Italian helicopter manufacturer Agusta S.p.A. (now AugustaWestland) back in 2000.
Agusta had started a joint venture in the late 1990s with European Aeronautic Defense and Space Company (EADS, the conglomerate that builds, among other things, the Airbus airliner) to develop a new helicopter for AVIC, called the Chinese Medium Helicopter (CMH). Agusta already had a relationship with P&WC—the company used P&WC’s PT6C-67C turboshaft engines as the power plant for its own AB139 civilian helicopter. So Agusta offered to bring P&WC into the deal.
The Chinese told P&WC that CMH was going to be a “common platform” for multiple helicopters—a gunship and a “dual use” transport helicopter that would be used for both civilian and military purposes. There was no timeline offered for the civilian version; AVIC was looking for a way to accelerate the development of the Z-10 attack helicopter without having to wait for Chinese engine manufacturers to catch up. So, given that much of the technology for the Z-10 itself was coming from Agusta, and Agusta already was familiar with the characteristics of the PT6C-67C engine, AVIC was hoping to get P&WC to provide development engines as a stopgap until their Chinese supplier was ready.
P&WC’s PT6C-67C turbine engine is sold worldwide for use in civilian helicopters; being Canadian, it didn’t fall under US export regulations. So the company thought it was in the clear to use the engine for the Z-10 project for development—so long as everyone thought the sale was for a “dual use” application, and not for a gunship.
The main problem that P&WC had to get past was the software that controlled the engine. Like most modern turbine engines, the PT6C can’t function without electronic engine control (EEC) software, which controls the flow of fuel to the engines, power output, and other parameters based on factors like air density, pressures within the engine, and the input from the pilot via a digital throttle control. The engines P&WC had sold previously to Agusta used both controller hardware and software from UTC’s avionic software subsidiary Hamilton Sundstrand—a US company based in Connecticut.
While exporting the software as part of engines for an Italian manufacturer wasn’t an issue, exporting the software to China was. And to get the engine controls to work properly with the avionics of an assault helicopter, changes were required, which would technically turn the software into a “defense article” covered by the US export ban.
The Canadian Department of Foreign Affairs and International Trade (DFAIT) initially was suspicious about the whole deal. P&WC disclosed the nature of the project in a request for a permit in September of 2000, saying that that a military helicopter would get the engine for development purposes first—leaving out the small detail that it was in fact an attack helicopter. DFAIT officials expressed concerns about the level of technology in the engines, and said that it would require an export license for the engines unless the initial version of the helicopter was “civil certified.” And according to internal documents, Canadian officials were “particularly interested to know whether the aircraft was a gun ship.”
That put a major crimp in the project’s timetable. When informed of the licensing issue by P&WC, the general director of AVIC offered a solution: “If P&WC needs, the Chinese party will provide related information of the civil version of the helicopter.” Within a month, representatives from CATIC delivered a briefing paper on a new helicopter—the Z10C, a 6-ton helicopter to be used for tourism, cargo transport, search and rescue, and other civilian purposes.
At the time, even P&WC’s marketing people were suspicious of the timing of the document. Doubts arose within the company that it was real—could it just be a ploy to help them win a Canadian export license for “dual use” engines?
In a November 13, 2000 e-mail, P&WC GM for Asia Marketing said that the “sudden appearance” of this civilian version of the helicopter “indicate[s] that it may have been put together to aid approval of export license.” However, he said this gave P&WC the cover it needed—“By putting forward the civil helicopter program now…real or imagined…an opening is created for P&WC to insist on exclusivity in civil version of this helicopter.”
The next day, P&WC sent another request letter to DFAIT, outlining the alleged civilian program. This time, a permit was granted. But as the project moved forward, the company remained concerned about the US government’s reaction to the program. In September of 2001, nine months after AVIC and CATIC signed a contract for 10 of the PTC6C engines for development, one P&WC manager warned in an e-mail:
Please note the attached notice (in bold) regarding the imposition of US sanctions on the Chinese Government for military aircraft. We must be very careful that the helicopter programs we are doing with the Chinese are not presented or viewed as military programs. As a result of these sanctions, we need to be very careful with the Z10C program. If the first flight will be with a gun ship then we could have problems with the US government. In addition, we could run into problems with the Canadian Government as we have told them that the program is civil and the military versions (gun ship) would have the Chinese WZ-9 engine. And so when P&WC sent a purchase order to Hamilton Sundstrand in January of 2002 requesting software development for the “CMH,” they told Hamilton Sundstrand representatives that the software was for a Chinese commercial helicopter. The company never mentioned the potential military use.
In 2002 and 2003, the ten “development” engines were shipped to China. Two were used in a ground test unit, and six were installed in three flight-test versions of the Z-10 (two were kept onhand as spares). Hamilton Sundstrand employees—not knowing they were producing software for a Chinese attack helicopter—shipped 12 different versions of the software to P&WC over that two-year period. After local testing, six of those versions were sent to China to be installed on the engines, sent as an e-mail attachment to be downloaded to the controller hardware.
It was clear that P&WC knew the software was export-controlled. In April of 2002, in a string of e-mails under the subject “EEC S/W Downloads for CMH (Z10) Program,” P&WC’s general manager for Asia marketing asked if there was any reason why P&WC couldn’t train Chinese developers to make changes in the code during helicopter development. The company’s export manager replied that the software “is controlled technology and is also US technology I think. If it is US, then we will require a US license.”
Hard problems to solve
Stopping advanced technology developed in the US from falling into potential adversaries’ hands is hard for a number of reasons. One of them is simply a matter of the reach of American authority—once technology leaves the US for a customer in an “approved” country, there’s no way to make sure it stays there. While the US and its allies may have somewhat consistent export laws, the enforcement of them is anything but consistent.
Identifying whether something actually falls under the definition of “arms” is an additional problem. So many products rely on technologies that can be classified as “dual use” that “it’s to the point where it’s impossible to tell how much falls under ITAR,” said Bobbi. “It requires a lot of oversight.”
With big aerospace companies, that oversight is sometimes lacking. Perhaps the most dramatic case came in 1996, when Loral Space and Communications “mistakenly sent to the Chinese” restricted information on missile technology. This came during the course of an investigation into the crash of a Long March rocket carrying a Loral-built communications satellite. The technology was instrumental in China improving its missile systems, including its ICBMs, and may have helped accelerate China’s own space program. Loral was fined $14 million and spent $6 million to improve its ITAR compliance program... but it also received authorization to keep working with the Chinese government.
In 2006, Boeing got caught up in the “dual use” mess when it was charged by the State Department with violating ITAR. The company was caught selling commercial jets to China and other countries between 2000 and 2003—jets equipped with flight boxes that contained a gyroscopic microchip. The company was fined $15 million, and the State Department imposed additional regulatory oversight on Boeing—because it was the company’s fourth strike since 1998.
You don’t have to be a big aerospace player to get caught up in sending technology to countries that shouldn’t have it. Take, for example, the case of Blue Coat, the network security vendor whose hardware made its way to Syria—and was used in efforts to censor the Web and track down dissidents within the country. Blue Coat’s Senior Vice President Steve Daheb told the Wall Street Journal that 13 of its security appliances being used in Syria were originally shipped to a distributor in Dubai, who identified the customer as Iraq’s Ministry of Communications. The State Department is still investigating that case.
“Where are the other ten seats?”
In March 2003, as development of the Chinese helicopter moved forward, P&WC engineers from Montreal flew to China to assist with ground testing for the first flight. On March 15, they got their first look at the helicopter prototype, which they had been told by management was for a 12-seat transport helicopter. They walked into the hangar and saw a helicopter with two PWC engines and two seats, one above and behind the other—for a gunner and a pilot. It also had mocked-up weapons systems.
Surprised, one of the Canadian engineers asked, “Where are the other ten seats?” The P&WC program chief laughed in response. Another engineer asked the Chinese about the design, and they politely explained that they had been budgeted to develop an attack helicopter.
When they got back to Montreal, the engineers met with the company’s Asia general manager and export manager, among others, for a debriefing. According to an engineer present at the meeting, the managers still felt the project could go forward as long as the engine had a “predominantly civil application.” The managers expressed surprise about the design but made no move to stop the program. The company proceeded as before, and engineers made several more trips to China to work on the Z-10.
It was apparently clear to the project team that it was time to cover themselves. The P&WC export manager sent a letter to the Canadian DFAIT, saying, “In the initial permit application we informed you… that there would be two aircraft development programs for both civil and military helicopters and that development of these helicopters would be done very much in parallel.”
But, the export manager wrote, the delays in the development of a Chinese engine for the military helicopter had “prompted the Chinese to consider using the PT6C-67C engine for the initial military aircraft,” and that the military helicopter’s development had rocketed ahead of the civilian one, with ground tests already using the P&WC engine. “First flight of the aircraft is expected to be before the end of April and will be the two seat military version of the aircraft and not the civil version.”
Not to worry, though, the export manager wrote: P&WC was “assured by the Chinese that the civil aircraft is continuing under development and that the [P&WC] engine would only be used on the military version for a limited transition production batch.” And, by the way, “because of the sensitivity of military programs in China,” the export manager asked DFAIT to contact the company if the officials thought they might need a permit now to export 100 more engines to China.
The P&WC export manager e-mailed a copy of the letter to UTC’s government business development staff in Washington, DC. But the information was never sent to Hamilton Sundstrand. A week later, Hamilton Sundstrand software engineers sent the final version of the EEC software to P&WC—which was promptly forwarded to China, despite the fact that it now seemed clear they were breaking US law.
Someone at Hamilton Sundstrand must have become suspicious of just what kind of helicopter he was writing code for, however. In the minutes of a Hamilton Sundstrand software control board meeting, notes included a discussion of clues that “PWC is having problems with export control.” About the same time, P&WC was looking for an alternate Canadian source for the software.
On January 28, 2004, Hamilton Sundstrand’s export compliance team requested an “end-use” statement from P&WC. This asked the company to spell out what the software was being used for. P&WC’s export manager sent an e-mail to the Asia general manager and other executives:
“We are now being asked by Hamilton Sundstrand to provide the end use for the Z10 program. They require this to determine if there are any US re-export issues. Would you please provide me with a statement of the end use for the Z10 program that I can provide to HS... I expect that this will not be the last request of this nature as the US suppliers are becoming more aware of export and re-export issues.”
A week later, P&WC sent back a response, indicating that the Z-10 military helicopter would be the first to get the engine and software:
Based on current activity, the military version of the helicopter appears to lead the development program. The civil program is active but certification date has not been announced... As the military version of the helicopter appears to be the first application, any US sourced components that are not common to other civil certified engine applications will be subject to the US ITAR controls and will require an export license from State in order for HS to ship the components to P&WC and for P&WC to ship these components either as spare parts or as part of the engine for this application to China. It is our understanding that the US will not issue an export license for any military component to China. We are therefore required to resource this component from HS to a non US supplier as we cannot risk the supply of components should the first application be military and we are refused a US export license for China. With that statement in hand, Hamilton Sundstrand could no longer legally do work on the project (and the company did cease work on the project). But that notification didn’t make its way back up through the parent company’s ranks, and the project continued without Hamilton Sundstrand’s involvement. P&WC could not quickly find a Canadian source for EEC software, since that would mean replacing EEC hardware as well and starting over from scratch. From that point on, P&WC took over work on the code itself, altering what Hamilton Sundstrand had already provided—shipping four of its own “patches” of Hamilton Sundstrand’s software to China between November 2004 and June 2005.
All the while, P&WC executives were telling the folks at the front office at UTC that everything was peachy.
“A Major Breakthrough”
In May of 2004, in a briefing for what Justice Department documents refer to as a “senior executive” of United Technologies on the ongoing project in China, P&WC executives called the program a “major breakthrough” for the company.
Instead of referring to the Z-10 as an attack helicopter, the report described it as a “two-seat military version” of a common helicopter platform that had been the first model to reach flight testing. “Because of the military applications, risks do exist on export control issues,” the report admitted, but P&WC executives asserted those risks had been dealt with by “obtaining the necessary export permits and through appropriate selection of suppliers for engine components."
But there were clearly doubts about how well the risk had been managed. A few days later, according to court documents, the briefing paper from P&WC ended up in front of Pratt & Whitney’s vice president for government business development in UTC’s Washington, DC office. According to the company’s records, that was David Manke. After reviewing it, he fired off e-mail messages to two top-level lawyers in Pratt & Whitney’s legal department who handled export control issues for the company:
Attached is a briefing paper for [UTC senior management’s] upcoming trip to China (June 22-26). Please note the description of the PT6 activity with the helicopters, especially the Z-10c. I would say that the “2 seat version” is code for an attack helicopter. I believe that Canada has all the appropriate approvals from the Canadian government and a paper trail to support this, however, this has the possibility to be very controversial and I’m sure [the UTC senior management] will want to be sure this has all the appropriate government approvals. Are you aware of this program? Any concerns? That e-mail triggered a flurry of e-mails between UTC’s legal department and P&WC about the origin of technology in the engines being shipped to China. In a June 3, 2004 e-mail, P&WC’s export manager assured UTC’s lawyers that there would be no US-origin EEC software on the production engines shipped to China. He didn’t mention the software that was already there on the development engines, however. After a series of meetings between Manke and the P&WC managers involved in the project, concerns seemed to be set aside.
It would be another year before the questions would come up again. In May 2005, as UTC senior managers were preparing to meet with the Chinese, they received a briefing paper on the Z-10 program. But this time, there was less credulity, and a UTC export specialist in DC fired off an e-mail to Hamilton Sundstrand. Senior management “needs to understand how it is that Pratt Canada can supply engines for the Z-10 Chinese military attack helicopters. I know we’ve discussed this before, but here’s what we need from Hamilton: What goods and technology does Hamilton supply to PWC that is used on these helicopters/engines?... Under what export authorization are they exported to Canada?"
Once again, P&WC’s export manager got pulled into the conversation. He claimed that the engine used in the project was “developed using Canadian technology” and the electronic engine controls were Canadian-sourced. But after more inquiries, a P&WC export project manager admitted that some engines had been shipped with Hamilton EECs and software for development (this admission came in a footnote within a reply).
Neither P&WC nor Hamilton reported the breach to the US government at this point—and development of the Z-10 once again went forward.
Getting the shaft
In 2006, the deal with the Chinese started to come apart. With development of the Z-10 nearly complete, the Chinese changed the game with the civil helicopter and renegotiated their deal to make P&WC the exclusive provider. The design of the “CMH” civilian helicopter was changed—now called the Z-15, it was nearly a full ton heavier than the Z-10. None of the development work done on the Z-10 would apply. P&WC would now have to re-compete with their engine against the French engine manufacturer Turbomeca.
On June 7, 2006, P&WC sent a letter to the Canadian government. The company reported, “Recent developments in the civil variant program” had called into question whether P&WC’s engines would ever be used in a civilian version of the Z-10. “The concept of the ‘common platform’ has been eroded.” Since this meant P&WC was being essentially cut out of its potential fortunes with a civilian Z-10, “we wish to be forthright and make you aware of these developments.” The company asked for permission to now pursue the Z-15 with the same engine.
Still, the breach of US export laws went unreported. But as the Z-10 deal went sour for P&WC, an investigation from outside the company was raising questions about the project—not from the government, but from an institutional investor. In February of 2006, an unnamed non-governmental organization, only identified by court documents as an organization that advises clients on socially responsible investing, sent an e-mail to UTC’s investor relations department as the company was preparing for its annual shareholders’ meeting. In essence, the message said that unless UTC came clean on what was going on with the Z-10, the organization would recommend that its clients dump their UTC stocks.
The inquiry from the NGO led to a meeting of UTC, Hamilton, Pratt & Whitney, and P&WC lawyers, and a team from UTC’s Export, Licensing, and Economic Sanctions office in April of 2006. That meeting led to more meetings, and more internal investigations. Finally, after a May 8 conference call, consensus was reached: it was time to inform the US State Department’s Directorate of Defense Trade Controls that the company had screwed up.
But when UTC sent its disclosure letter to the State Department, the company’s representatives said the company had no idea that the Chinese were developing an attack helicopter until 2004, and that the company had taken “swift remedial action.”
It would be another four years until the company would admit that Hamilton had neglected to follow through on those actions, as the State Department continued to follow up on the disclosure. Finally, in a July 2010 response to yet another State Department inquiry, UTC admitted that Hamilton had exaggerated the degree to which they had corrected their actions and had lied to the State Department to help make the problem look less severe.
The wages of sin
That confession led to things hitting the fan for UTC—the State Department launched a full investigation and brought in the Justice Department. On June 28, UTC's lawyers admitted the company's violation of the law after negotiating a deferred prosecution agreement with the Justice Department.
In the plea, the company’s lawyers confessed the organization’s guilt in violating the defense embargo on China and other international trade regulations. UTC agreed to pay a fine of $20.7 million dollars—$4.6 million (twice the value of the 10 engines sold to the Chinese, plus spare parts and support work) plus a $14 million “deferred prosecution monetary penalty.” UTC also agreed to pay the State Department a $55 million civil penalty—$20 million of which was suspended. To keep that $20 million, UTC has to satisfy the State Department that it has cleaned up its compliance act.
In comparison to other fines that companies have been hit with for these sorts of export violations, the $75 million (or $55 million) that UTC will have to cough up is substantial. But it’s just a speed bump when compared to the value of the company’s continuing business in China. The company’s wrongdoing didn’t even faze stockholders.
After news of the agreement broke, the company’s stock price... was up. Ars Technica |
| | | yassine1985 Colonel-Major
messages : 2948 Inscrit le : 11/11/2010 Localisation : Marrakech Nationalité : Médailles de mérite :
| Sujet: Re: Espionnage industriel et militaire Ven 1 Fév 2013 - 8:30 | |
| - Citation :
Alleged Canadian Spy Sold Secrets to Russia for $72,000
MOSCOW, February 1 (RIA Novosti) - A Canadian naval officer on a court trial under espionage charges received almost $72,000 for passing classified information to the Russian military, Canada’s CBC television network reported citing prosecution. Sub-Lieutenant Jeffrey Paul Delisle, who served at a Canadian naval intelligence center in Halifax, was arrested in January 2012. Last October he pleaded guilty to charges pressed against him.
Federal Crown attorney Lyne Decarie said that between 2007 and 2011 Delisle received from the Russian military a total of 23 financial tranches that amounted to the eventual sum of $71,817. The verdict in Delisle’s case will be brought after the two-day court hearings, which began in Halifax on Thursday. The charges were brought under the information security law adopted in December 2001 after the 9/11 terrorist attacks in the United States. If Delisle is found guilty, he faces life in prison.
According to prosecutors, Delisle provided his Russian handlers with material downloaded from the computer system at the HMCS Trinity intelligence facility, which shares information with intelligence communities. Delisle’s Russian handlers, according to the prosecution, paid him $3,000 a month for the information, which was mainly military intelligence but also included reports on organized crime as well as personal information on politicians and senior members of the intelligence community.
He came under suspicion in the fall of 2011 after Canadian customs officials found that he had returned from a four-day trip to Brazil with $10,000 in cash and $40,000 in prepaid debit cards, which he had in fact received from a Russian contact in Rio de Janeiro, according to the allegations.
RIAN _________________ ."قال الرسول صلى الله عليه وسلم : "أيما امرأة استعطرت فمرّت بقوم ليجدوا ريحها فهي زانية
| |
| | | yassine1985 Colonel-Major
messages : 2948 Inscrit le : 11/11/2010 Localisation : Marrakech Nationalité : Médailles de mérite :
| Sujet: Re: Espionnage industriel et militaire Mar 2 Juil 2013 - 12:00 | |
| - Citation :
Allemagne: un couple condamné pour espionnage au profit de la Russie
Un tribunal de Stuttgart a reconnu mardi Andreas et Heidrun Anschlag coupables d'espionnage au profit du Service de renseignement extérieur (Russie), les condamnant à 6,5 et 5,5 ans de prison respectivement, rapporte le correspondant de RIA Novosti.
Le tribunal a également condamné les époux à une amende de 500.000 euros, et a prescrit de retenir les biens confisqués au cours de l'enquête.
L'accusation avait requis 7,5 ans de prison contre Andreas Anschlag et 4,5 ans contre Heidrun Anschlag ainsi qu'une amende de 500.000 euros.
Porteurs de faux passeports autrichiens, les époux qui résidaient en Allemagne ont été arrêtés dans la ville de Marbourg, dans le Land de Hesse, en octobre 2011. Le 27 septembre 2012, ils ont été formellement accusés d'espionnage pour le compte d'un service de renseignement extérieur.
Les médias supposaient que les époux transmettaient au SVR des informations militaires, politiques et industrielles. Selon les experts, le couple, qui s'est livré à l'espionnage pendant 25 ans, aurait pu nuire sérieusement à l'Otan et à l'UE.
D'après Die Welt, les Anschlag auraient notamment transmis à Moscou des documents sur la mission européenne de justice et de police au Kosovo Eulex. Ils transmettaient des documents confidentiels par l'intermédiaire de diplomates néerlandais.
On est loin des punitions à la Staline ! _________________ ."قال الرسول صلى الله عليه وسلم : "أيما امرأة استعطرت فمرّت بقوم ليجدوا ريحها فهي زانية
| |
| | | Yakuza Administrateur
messages : 21656 Inscrit le : 15/09/2009 Localisation : 511 Nationalité : Médailles de mérite :
| Sujet: Re: Espionnage industriel et militaire Mar 2 Juil 2013 - 12:36 | |
| la justice allemande en general ne donne pas bcp pour espionnage _________________ | |
| | | yassine1985 Colonel-Major
messages : 2948 Inscrit le : 11/11/2010 Localisation : Marrakech Nationalité : Médailles de mérite :
| Sujet: Re: Espionnage industriel et militaire Jeu 29 Aoû 2013 - 8:04 | |
| Les espions russes destiner aux US vont chomer : - Citation :
US Navy Submariner Convicted of Attempting to Spy for Russia
A former US Navy petty officer could be jailed for life after being convicted of attempted espionage for trying to pass classified information to people he thought worked for Russia, but were really US investigators.
A federal jury in Virginia took just 90 minutes on Wednesday to find Robert Patrick Hoffman II, 40, guilty.
Prosecutors said Hoffman, who spent most of his 20 years in the Navy working on submarines as a cryptologic technician, and had top secret security clearance, last year gave classified information about how to track US submarines and how the United States tracks foreign warships, to people he believed were Russian operatives.
The US Federal Bureau of Investigation (FBI) began investigating Hoffman last year after learning that he spent three weeks in Belarus in 2011 and met President Alexander Lukashenko, wrote a reporter for the Virginian-Pilot, who covered the case. In September last year, the FBI sent Hoffman a letter, which purported to be an offer from Russian government agents in Moscow who offered him "generous compensation" in exchange for technical information.
Assistant US Attorney Alan Salsbury said Hoffman made three “drops” at a state park in Virginia after receiving the letter. One of the drops contained a flash drive with copies of documents, some marked “top secret,” that showed how to track American submarines and how the United States tracks foreign warships. Hoffman’s attorneys said in his defense that he went to the FBI after the third drop and asked for help catching his contacts. Witnesses testified that Hoffman never asked for or received compensation for providing the information.
Hoffman, who retired from the Navy in 2011 with the rank of petty officer first class, will be sentenced in December.
RIA _________________ ."قال الرسول صلى الله عليه وسلم : "أيما امرأة استعطرت فمرّت بقوم ليجدوا ريحها فهي زانية
| |
| | | annabi Général de corps d'armée (ANP)
messages : 6945 Inscrit le : 18/07/2012 Localisation : paris Nationalité : Médailles de mérite :
| Sujet: Re: Espionnage industriel et militaire Mer 30 Oct 2013 - 23:43 | |
| - Citation :
- Un homme Britannique inculpé d’avoir piraté les réseaux militaires des Etats-Unis
Un homme Britannique a été inculpé d’être lié à un piratage de plusieurs systèmes informatiques du gouvernement des Etats-Unis, compromettant les données personnelles du personnel militaire des E.U. et des millions de dollars de pertes, d’après l’avocat Américain Paul Fishman dans le New Jersey. - Citation :
- Un Britannique a été arrêté en Angleterre et a été inculpé par les Etats-Unis et la Grande-Bretagne d’avoir infiltré les systèmes informations du gouvernement Américain, y compris ceux dirigés par l’armée, afin de voler des données confidentielles et perturber des opérations, ont déclaré les autorités.
Les procureurs américains ont déclaré que le pirate présumé, Lauri Love, a infiltré des milliers de systèmes informatiques, y compris ceux de l’Agence de défense antimissile du Pentagone, le US Army Corps of Engineers, l’Agence Spatiale Américaine (NASA) et l’Environmental Protection Agency (EPA). Love, 28 ans, et trois co-conspirateurs anonymes, que l’on pense vivre en Australie et en Suède, dédiaient leurs activités à « perturber les opérations et l’infrastructure du gouvernement des Etats-Unis, » selon un acte d’accusation américain rendu public lundi. « Une telle conduite met en danger la sécurité de notre pays et est un affront pour ceux qui servent, » a dit dans une déclaration, l’avocat Américain Paul Fishman dans le New Jersey, qui annonçait les inculpations. Love a été inculpé en Grande Bretagne de violation du Computer Misuse Act, et inculpé aux Etats-Unis d’avoir accédé aux ordinateurs du gouvernement Américain sans permission et de conspiration, ont dit les autorités. Fishman a dit que le piratage eu lieu d’Octobre 2012 jusqu’à ce mois-ci.
http://www.wikibusterz.com/homme-britannique-inculpe-davoir-pirate-les-reseaux-militaires-etats-unis/
| |
| | | MAATAWI Modérateur
messages : 14756 Inscrit le : 07/09/2009 Localisation : Maroc Nationalité : Médailles de mérite :
| Sujet: Re: Espionnage industriel et militaire Lun 10 Mar 2014 - 17:05 | |
| - Citation :
- Cyber attack on Russia hits India, secret defence documents leaked
A cyber attack on Russian communication systems by anonymous hackers on early Saturday morning has compromised India's defence dealings with Russia and raised serious concerns about a possible major security breach. Believed to have been carried out by an international group of anonymous hackers in retaliation to the last week's Russian invasion of Ukraine, the attack was detected by Indian technical intelligence agencies at about 4am on Saturday. Most of the leaked documents relate to India's dealings with Russia for the purchase, overhaul and repair of front-line fighter aircraft like the Sukhoi-30 MKI and the MiG-29. They include correspondence between Russia's United Aircraft Corporation (UAC), which makes the SU-30 and MiG-29 among other aircraft, and the Hindustan Aeronautics Limited (HAL) which manufactures the aircraft under license in India. The offices of the defence ministry and national security advisor were alerted after the breach was detected, said an official familiar with the development.
However, Bangalore-based HAL spokesperson Gopal Sutar told HT he couldn't comment because they had not been informed till Saturday evening. Sutar, however, confirmed that some of the documents mentioned by HT to him seemed authentic. Several letters written by UAC president M Pogosyan to HAL chairman RK Tyagi refer to a host of issues discussed during the 31st session of Indo-Russian Subgroup on Aviation (IRSA) held in New Delhi on February 20 this year. The IRSA is a sub-group of the Indo-Russian Inter Governmental Commission on Military Technical Cooperation. Some of these letters discuss the delays in finalising a contract between UAC and HAL for the RD-33 MK engines, which power the MiG-29 fighter aircraft. In one of the leaked communications, Pogosyan writes to Tyagi that the "reason for the delay in delivery documentation" is due to "too much time" being spent on discussing "the formula escalation." Obviously, this indicates that there are delays in the MiG-29 up gradation programme that is being negotiated between Russia and India. There is also a discussion on the AL-31 FP engines which power the SU-30 MKI and are particularly made for the Indian variant of the fighter aircraft. Pogosyan writes that he "agree(s) this project causes great concern." There is also a great deal of discussion in setting up Repair and Over Haul (ROH) facilities for the SU-30 MKI, which has been delayed due to indecision on the deputation of Russian specialists. Pogosyan admits that the delays are due to the disagreements between Russia and India on the "financial aspect of reimbursement rates for 2014". However, he assures Tyagi that he is ready to continue with their commitments for the continuous overhaul of the SU-30 MKIs until the problem is resolved.
The other documents that have been leaked are details of visa applications for Russian specialists to India and Indian engineers from HAL travelling to Moscow. One of the documents has also been signed by Group Captain Ashutosh Lal, air attaché with the embassy of India in Ukraine on December 12, 2013. Most of the other documents are Letters of Credit (LoC) that have been issued by the Avionics Division of HAL to their Russian counterparts so that critical orders can be processed. Some of these LoCs are to the tune of $ 1.6 million. Indian security experts are examining the leaked data to gauge the extent of the breach since most of this communication is considered secret. http://www.hindustantimes.com | |
| | | yassine1985 Colonel-Major
messages : 2948 Inscrit le : 11/11/2010 Localisation : Marrakech Nationalité : Médailles de mérite :
| Sujet: Re: Espionnage industriel et militaire Mar 28 Oct 2014 - 11:26 | |
| - Citation :
Russia May Have Hacked US Firm Keeping Classified Military Data: Cybersecurity Company
According to the report titled "A Window into Russia's Cyber Espionage Operations", the assumed group of hackers had a particular focus on the post-Soviet republic of Georgia and Eastern European nations, as well as European security organizations, including NATO.
Skilled Russian hackers, apparently backed by the Russian government, may have been hacking the servers of a US firm keeping classified military data since 2007, cybersecurity company FireEye said Tuesday in a report.
"The activity that we profile in this paper appears to be the work of a skilled team of developers and operators collecting intelligence on defense and geopolitical issues – intelligence that would only be useful to a government," the report says.
"We assess that APT28 [FireEye's codename for the group] is most likely sponsored by the Russian government," it added.
The paper titled "A Window into Russia's Cyber Espionage Operations" specified that the principal portion of the hacking activities happens during working hours in Moscow and St. Petersburg. Moreover, the authors of the report claim that part of the malware samples included Russian language settings.
According to the report, the assumed group of hackers had a particular focus on the post-Soviet republic of Georgia and Eastern European nations, as well as European security organizations, including NATO. Thus, FireEye concludes that the nature and scope of hacking activities points to the Russian authorities' backing of the hacking group.
The United States has repeatedly called China and Russia as the principal cyber threats. China, in turn, has repeatedly denied its involvement in any illegal activities in cyberspace and has complained about US activity on the Chinese Internet.
RIAN _________________ ."قال الرسول صلى الله عليه وسلم : "أيما امرأة استعطرت فمرّت بقوم ليجدوا ريحها فهي زانية
| |
| | | youssef_ma73 General de Brigade
messages : 3005 Inscrit le : 04/08/2014 Localisation : France Nationalité : Médailles de mérite :
| Sujet: Re: Espionnage industriel et militaire Ven 27 Fév 2015 - 11:26 | |
| - Citation :
Guilty Plea in Iran, F-35 Data Smuggling Case
WASHINGTON — A Connecticut-area man has pleaded guilty to stealing technical data on the engines for the F-22 Raptor and F-35 joint strike fighter with the intent to ship it to Iran, the FBI announced Thursday.
Mozaffar Khazaee, 60, will be sentenced in May and faces up to 20 years in prison and a $1 million fine.
"While employed with U.S. defense contractors, Mozaffar Khazaee stole sensitive, proprietary and controlled technology to send it to Iran," Deirdre Daly, United States Attorney for the District of Connecticut, said in the announcement. "The illegal export of our military technology compromises U.S. national security and reduces the advantages our armed forces currently possess."
According to the release, investigators found that between 2009 and 2013, Khazaee tried to transfer information from the defense industry back to Iran. During that time, he was employed by three different defense contractors, but was apparently seeking a job back in Iran, frequently contacting state-controlled technical universities offering access to his data.
At one point, Khazaee apparently wrote to a contact in Iran that as "lead engineer in these projects I have learned some of the key technique[s] that could be transferred to our own industry and universities," adding that he was "looking for an opportunity to work in Iran, and . . . transferring my skill and knowledge to my nation."
Although his stateside employers were not named in the announcement, engine manufacturer Pratt & Whitney has confirmed that Khazaee was an employee of theirs during this period. Pratt manufactures the engines for both the F-22 and F-35.
DEFENSE NEWS
Man Arrested for Attempted Transfer of F-35 Data to Iran
Federal agents began investigating Khazaee in November 2013, when he attempted to send a large shipment of documents from Connecticut to the Iranian city of Hamadan. When agents inspected the shipment, they found "numerous boxes of documents consisting of sensitive technical manuals, specification sheets, and other proprietary material for the F-35," according to a government notice last year.
Overall, the shipment included thousands of pages of documents, including diagrams and blueprints of the high-tech fighter jet's engine. Some of the information was marked as being ITAR- and export-controlled information.
He was arrested Jan. 9 of 2014 while on his way to Tehran; he had further technical data on his person when he was seized.
It's not the only known case of industrial secrets being stolen from defense contractors being pursued by attorneys in Connecticut.
DEFENSE NEWS
Chinese National Accused of Transporting USAF Program Information
A former employee of United Technologies Research Center, a sister company to Pratt & Whitney, was arrested in November after he tried to transfer sensitive proprietary information on titanium used in a US Air Force program, most likely the F-35, to China.
China has long been suspected of corporate espionage on the joint strike fighter program, something only reinforced by the striking resemblance between its J-31 fighter and the F-35. http://www.defensenews.com/story/defense/policy-budget/industry/2015/02/26/iran-f-35-smuggling-case-guilty-plea/24053803/
_________________ “Le monde ne sera pas détruit par ceux qui font le mal, mais par ceux qui les regardent sans rien faire.” Albert Einstein. | |
| | | Adam Modérateur
messages : 6300 Inscrit le : 25/03/2009 Localisation : Royaume pour tous les Marocains Nationalité : Médailles de mérite :
| Sujet: Re: Espionnage industriel et militaire Mar 31 Aoû 2021 - 15:16 | |
| Le FSB, par le biais de sociétés écrans, est arrivé à acheter des technologies américaines sensibles, des équipements de plongée, des machines-outils à double usage, des composants utilisés dans les appareils de vision nocturne et d' imagerie thermique ..... https://twitter.com/StrickerNonpro/status/1432358571723788290?s=20 _________________ Les peuples ne meurent jamais de faim mais de honte.
| |
| | | Contenu sponsorisé
| Sujet: Re: Espionnage industriel et militaire | |
| |
| | | | Espionnage industriel et militaire | |
|
| Permission de ce forum: | Vous ne pouvez pas répondre aux sujets dans ce forum
| |
| |
| |
|