recommended reading

NASA engineer, defense contractor knowingly bought illicit software from Chinese conspirator

Cienpies Design/Shutterstock.com

This story has been updated to include video of undercover meetings with Xiang Li.

Chinese resident Xiang Li has pleaded guilty to copyright infringement and wire fraud charges connected to a bootleg software conspiracy that involved federal sector accomplices, U.S. authorities are expected to announce today in Wilmington, Del.

A NASA engineer and government contractor knowingly bought some of the $100 million worth of critical computer programs that Li copied from mainly American companies, according to court papers and officials.

Immigration and Customs Enforcement Director John Morton and U.S. Attorney Charles M. Oberly III are scheduled to make public the successful prosecution of Li on Tuesday.

“Some of Li’s biggest customers were Americans who held significant engineering positions with government agencies and government contractors,” ICE spokesman Ross Feinstein said.

Between April 2008 and June 2011, Li peddled ill-gotten software through the Web to colluding customers, including the U.S. public sector employees, according to court documents filed on Jan. 4. Software that retails for as much as $3 million sold for between $20 and $1,200 on the Internet shopping sites he maintained. The pirated software has uses for, among other things, defense, space exploration and explosive simulation.

The “defendant acknowledged his involvement in this unlawful software piracy conspiracy throughout his emails with customers,” state the court papers. Clients in the United States, including small business owners, students and inventors accounted for more than one-third of the illegal software buys. The papers note that in one correspondence with a customer, Li describes his enterprise as “an international organization created to crack declassified document[s].”

In 2011, Chinese actors were characterized as “the world's most active and persistent perpetrators of economic espionage" by the Office of the Director of National Intelligence.

Cosburn Wedderburn, who was at the time of the crime a NASA electronics engineer, purchased illicit programs from Li worth a combined $1.2 million, according to officials. The software is used for telecommunications design and aerospace, among other applications.

Wronald Best, then a chief scientist at a Kentucky-based defense contractor, exchanged more than 260 emails with Li, court documents show. His company, which also supports law enforcement agencies, provides services related to radio transmissions, radar, and vacuum tubes used in military helicopters. Best’s purchases would have sold for $600,000 on store shelves.

Best is scheduled for sentencing on Feb. 1, Feinstein said, adding that a telephone conference with the court regarding Wedderburn has been set for April 29.

Li collected payments through wire services such as Western Union and MoneyGram, but profited only about $60,000 off those transactions, according to court documents. He used a Gmail account to transfer the counterfeit copies through “compressed electronic files or hyperlinks to download servers located in the United States and elsewhere,” the documents state.

Homeland Security released video of the meetings with undercover agents.

Video 1:

Video 2:


Video 3:

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.