recommended reading

NASA engineer, defense contractor knowingly bought illicit software from Chinese conspirator

Cienpies Design/

This story has been updated to include video of undercover meetings with Xiang Li.

Chinese resident Xiang Li has pleaded guilty to copyright infringement and wire fraud charges connected to a bootleg software conspiracy that involved federal sector accomplices, U.S. authorities are expected to announce today in Wilmington, Del.

A NASA engineer and government contractor knowingly bought some of the $100 million worth of critical computer programs that Li copied from mainly American companies, according to court papers and officials.

Immigration and Customs Enforcement Director John Morton and U.S. Attorney Charles M. Oberly III are scheduled to make public the successful prosecution of Li on Tuesday.

“Some of Li’s biggest customers were Americans who held significant engineering positions with government agencies and government contractors,” ICE spokesman Ross Feinstein said.

Between April 2008 and June 2011, Li peddled ill-gotten software through the Web to colluding customers, including the U.S. public sector employees, according to court documents filed on Jan. 4. Software that retails for as much as $3 million sold for between $20 and $1,200 on the Internet shopping sites he maintained. The pirated software has uses for, among other things, defense, space exploration and explosive simulation.

The “defendant acknowledged his involvement in this unlawful software piracy conspiracy throughout his emails with customers,” state the court papers. Clients in the United States, including small business owners, students and inventors accounted for more than one-third of the illegal software buys. The papers note that in one correspondence with a customer, Li describes his enterprise as “an international organization created to crack declassified document[s].”

In 2011, Chinese actors were characterized as “the world's most active and persistent perpetrators of economic espionage" by the Office of the Director of National Intelligence.

Cosburn Wedderburn, who was at the time of the crime a NASA electronics engineer, purchased illicit programs from Li worth a combined $1.2 million, according to officials. The software is used for telecommunications design and aerospace, among other applications.

Wronald Best, then a chief scientist at a Kentucky-based defense contractor, exchanged more than 260 emails with Li, court documents show. His company, which also supports law enforcement agencies, provides services related to radio transmissions, radar, and vacuum tubes used in military helicopters. Best’s purchases would have sold for $600,000 on store shelves.

Best is scheduled for sentencing on Feb. 1, Feinstein said, adding that a telephone conference with the court regarding Wedderburn has been set for April 29.

Li collected payments through wire services such as Western Union and MoneyGram, but profited only about $60,000 off those transactions, according to court documents. He used a Gmail account to transfer the counterfeit copies through “compressed electronic files or hyperlinks to download servers located in the United States and elsewhere,” the documents state.

Homeland Security released video of the meetings with undercover agents.

Video 1:

Video 2:

Video 3:

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.