设万维读者为首页 广告服务 联系我们 关于万维
简体 繁体 手机版
分类广告
版主:白夫长
万维读者网 > 军事天地 > 帖子
美国司法部起诉5名中国军方黑客起诉状,请翻阅一下
送交者: 极右派 2014年05月19日10:00:15 于 [军事天地] 发送悄悄话

 

 

 

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF PENNSYLVANIA

 


UNITED STATES OF AMERICA

 

v.

 

WANG DONG, a/k/a "Jack Wang," a/k/a "UglyGorilla,"

SUN KAILIANG, a/k/a "Sun Kai

Liang," a/k/a "Jack Sun,"

WEN XINYU, a/k/a "Wen Xin Yu," a/k/a "WinXYHappy," a/k/a "Win_XY," a/k/a "Lao Wen,"

HUANG ZHENYU, a/k/a "Huang Zhen

Yu," a/k/a "hzy_lhx," GU CHUNHUI, a/k/a "Gu Chun

Hui," a/k/a "KandyGoo,"


Criminal No. L--H

 

 

 

 

UNDER   SEAL

 

 

 

 

 

FILED

 

MAY  -1 Z014

 

CLERK  U.S. DISTRICT COURT


 

INDICTMENT  MEMORANDUM


WEST. DIST. OF PENNSYLVANIA


 

AND NOW  comes the United States of America, by its

 

attorneys, David  J.  Hickton, United  States Attorney   for  the

 


Western  District  of  Pennsylvania,


and  James   T.


Kitchen,


 

Assistant United States Attorney for said District, and submits this Indictment Memorandum to the Court:

I .        THE   INDICTMENT

A   Federal Grand Jury returned a  31-count Indictment against        the above-named defendants for  alleged violations of

 

federal law:

 


 

 

COUNT  OFFENSE/DATE


 

TITLE/SECTION


DEFENDANTS CHARGED


 


 

1      Conspiracy to Commit Computer Fraud, from in or about 2010 to in or about April 2014


18 u.s.c. §  1030(b)    All defendants


 

 

1


 

 

 

 

 


 

COUNT


OFFENSE/DATE


TITLE/SECTION           DEFENDANTS CHARGED


 


 

2-9

 

 

 

 

 

 

 

 

 

10-23


Intentionally Accessing and

Obtaining Information from a Protected Computer, on various dates from on or about February 26, 2010 to on or about April 13, 2012

 

 

Intentional Damage to a Protected Computer, on various dates from on or about February 8, 2010 to on or about April 13, 2012


18 u.s.c. §

1030(a)(2)(C) &

(c)(2)(B)  (i)-(iii)

 

 

 

 

 

18 u.s.c. §

1030(a) (5) (A) &

(c) (4) (B)


All defendants

 

 

 

 

 

 

 

All defendants


24-29

Aggravated Identity Theft,

18 u.s.c. §                                    All

 

from on or about December

1028A(a)(1),

(b),

&

defendants

 

30, 2010 to on or about

(c) ( 4)

 

 

 

 

April 13, 2012

 

 

 

 

 

30      Economic Espionage, on or      18 u.s.c. §                                    All

about May 6, 2010              1831(a)(2) &      ( 4)                      defendants

 

 

31

Theft of Trade Secrets,

on

18 u.s.c. §

 

All

 

or about May 6, 2010

 

1832(a)(2) &

(4)

defendants

 

II.   ELEMENTS OF THE OFFENSES

 

A.    As   to   Count   1:     In   order   for   the   crime   of

 

Conspiracy  to Commit Computer Fraud, in violation of 18 U.S.C. §

1030(b), to be established, the government must prove all of the following essential elements beyond a reasonable doubt:

 

1.    That   two   or   more   persons   agreed   to   commit   an

 

offense   set   forth   under   subsection    (a) of   Title   18,   United

 

States Code, Section 1030;

 

2.    That the defendants were a party to or member of

 

that agreement;

 

2


Case 2:14-cr-00118-CB     Document 4   Filed 05/01/14    Page 3 of 11

 

 

 

3. That the defendants joined the agreement or conspiracy knowing of its objective to commit an offense in violation of subsection (a) of 18 U.S.C. §  1030, and intending to join together with at least one other alleged conspirator to achieve those objectives; that is, that the defendants and at least one other alleged conspirator shared a unity of purpose and the intent to achieve common goals or objectives, to commit an offense in violation of subsection (a) of 18 U.S.C. § 1030.

B.          As   to   Counts   2-9:     In order for the crime of

 

Illegal   Access    and   Obtaining    Information    from    a   Protected Computer, in violation of 18 U.S.C. §  1030(a)(2) &               (c)(2)(B)(i)­ (iii), to be established, the government must prove all of the following essential elements beyond a reasonable doubt:

1.   The defendants intentionally accessed a computer

 

without authorization or in excess of authorization;

 

2.        That   the   defendants  obtained   thereby   the

 

information in the relevant count;

 

3.   From a "protected computer;u and

 

4.    That the offense:

 

a.   Was  committed  for  purposes   of  commercial advantage or private financial gain;

b.   Was committed in furtherance of any criminal

 

or tortious act in violation of the Constitution or laws of the

 

United States or of any State; or

 

 

 

3


---··

 

Case 2:14-cr-00118-CB     Document 4   Filed 05/01/14     Page 4 of 11

 

 

 

c.         Involved       the         obtaining         of        information exceeding $5,000 in value.

c.       As     to      Counts    10-23:          In    order     for     the     crime  of

 

Intentional  Damage   to  a  Protected   Computer, in  violation  of   18

 

U.S.C.   §    1030(a) (5) (A)     &       (c) (4) (B),    to    be   established,    the government   must   prove   all  of   the   following   essential  elements beyond  a   reasonable  doubt:

1.         That    the  defendants      knowingly caused  transmission

 

of  a   program, information,   or  command;

 

2.         That,       as      a     result       of     such    transmission,       the defendants intentionally  caused  damage to  a   protected  computer;

3.         The    damage    caused      by     the     defendants      was   without authorization;  and

4.       That    the     offense     resulted      in     a    loss     of     $5,000

 

during     one  year,    or   the   damage affected   ten  or  more   protected computers during  one year.

D.    As    to      Counts    24-29:          In    order     for     the     crime  of

 

Aggravated Identity   Theft,   in    violation     of     18    u.s.c.    §

 

1028A(a) (1),   (b),    (c) (4),  to be  established,   the government   must prove  all    of     the    following  essential    elements     beyond    a reasonable  doubt:

1.        That   the    defendants   violated     the     Computer     Fraud and Abuse Act,  as  charged  in  Count One;

 

 

 

 

 

4


- ··     --···  -·-··  -····

 

Case 2:14-cr-00118-CB     Document 4   Filed 05/01/14      Page 5 of 11

 

 

 

2.   That the defendants, during and in relation to that conspiracy, knowingly transferred, possessed or used, a "means of identification;"

3.   Without lawful authority; and

 

4.  Which means of identification belonged to another person.

18 U.S.C. § 1028A(a)(1).

 

E.   As to Count 30:  In order for the crime of Economic Espionage, in violation of 18 U.S.C. §  1831(a)(2) &        (4) ,   to be established, the government must prove all of the following essential elements beyond a reasonable doubt:

1.   That the defendants, intending or knowing that an

 

offense   will   benefit   any   foreign    government,   foreign instrumentality, or foreign agent;

2)    Knowingly   stole   or   without   authorization

 

appropriated  information   (including  through    copying    and

 

downloading); and

 

3.   That the defendants knew or  had  a  firm belief that the information was a trade secret;

4.   (Except   in   the   case   of   an   attempt)   That   the information was, in fact, a trade secret.

F.    As to Count 31:    In order for the crime of Theft of

 

Trade Secrets, in violation of 18 U.S.C. §  1832(a)(2) &  (4), to be established, the government must prove all of the following

essential elements beyond a reasonable doubt:

 

5


Case 2:14-cr-00118-CB     Document 4   Filed 05/01/14      Page 6 of 11

 

 

 

1.   That the defendants, knowing or intending that an offense would economically benefit someone other than the owner

thereof;

 


2.    Knowingly


stole   or   without   authorization


 


appropriated

 

downloading);


information


(including  through    copying    and


3.   That the defendants knew or  had  a  firm belief

 

that the information was a trade secret;

 

4.  The defendants acted with the knowledge or intent that the offense would injure the trade secret owner.

5.   (Except in cases of attempt)  that the information

 

taken or possessed was a trade secret; and

 

6.  That the trade secret was related to or included in a product that was produced for or placed in interstate or foreign commerce.

G.   Pinkerton Liability

 

For a defendant to be guilty of a substantive crime based on Pinkerton liability, the Government must prove:

1.   That the defendant was a member of the conspiracy

 

charged in the indictment;

 

2.   That while the defendant was still a member of the conspiracy,  one  or more  of the  other members  of the conspiracy committed the substantive offense charged in the

relevant count, by  committing each of  the elements of  that

 

offense;

 

6


- -

 

Case 2:14-cr-00118-CB     Document 4     Filed 05/01/14     Page 7 of 11

 

 

 

3. That the other members of the conspiracy committed this offense within the scope of the unlawful agreement and to help further or achieve the objective(s) of the conspiracy; and

4.    That these offenses were reasonably foreseeable to

 

or   reasonably   anticipated   by   the   defendant   as   necessary   or natural consequences of the unlawful agreement.

The government does not have to prove that the defendants specifically  agreed  or  knew  that  this  offense  would  be committed.  However, the government must prove that the offense was reasonably foreseeable to the defendants, as a member of the conspiracy,  and  within  the  scope  of  the  agreement  as  the defendants understood it.

Third Circuit Model Jury Instruction 7.03.

 


H.   Accomplice   Liability:

u.s.c. §  2)


Aiding   and   Abetting    (18


In order to find a defendant guilty of an offense he or she aided or abetted, the government must prove:

1.   That the alleged principal committed the offenses charged  by  committing  each  of the elements  of the  offenses charged.

2.   That the defendant knew that the offenses charged was going to be committed or was committed by the principal;

3.    That the defendant knowingly did some act for the

 

purpose    of   aiding,   assisting,    soliciting,    facilitating,    or

 

encouraging    the    alleged    principal    to   commit    the    specific

 

 

7


-

 

Case 2:14-cr-00118-CB     Document 4   Filed 05/01/14     Page 8 of 11

 

 

 

offenses charged and with the intent that the alleged principal commit those specific offenses; and

4.   That the defendant's acts did, in some way, aid,

 

assist, facilitate, or encourage the alleged principal to commit the offense.   The defendant's acts need not themselves be against the law.

Third Circuit Model Jury Instruction 7.02.

 

III.      PENALTIES

 

 

A.    As     to      Count    1:         Conspiracy       to     Commit  Computer

 

Fraud (18 U.S.C.  §  1030(b));  Multi-Object Conspiracy to violate

 

 

18 U.S.C.  §  1030(a) (2) (C)    and  (c) (2) (B)  (i)-(iii) and  18  U.S.C.   §

 

1030 (a) (5) (A)    &   (c) (4) (B)  :

 

 

In the  case  of  a conviction  on a Conspiracy to violate

 

18 U . S . C . § 10 30 (a) ( 2 ) (C)    and  (c) ( 2 )  (B)  ( i) - (iii) :

 

1.        Individuals        The    maximum   penalties    for

 

individuals are:

 

(a) a term of imprisonment of not more than 5 years;

(b) a  fine of  up  to  $250,000  or  twice  the pecuniary gain to any person or twice the pecuniary loss to any person;

(c) A term  of  supervised release of  not  more

 

than three years.

 

(d) Any or all of the above.

 

 

 

8


Case 2:14-cr-00118-CB     Document 4   Filed 05/01/14     Page 9 of 11

 

 

 

In the  case  of  a conviction  on   a  Conspiracy  to violate

 

18 U.S. C.   §  1030 (a) (5) (A)   and  (c) (4) (B)  :

 

 

1.        Individuals        The    maximum    penalties    for individuals are:

(a) a term of imprisonment of not more than 10 years;

(b) a  fine   of  up  to   $250,000   or  twice   the

 

pecuniary gain to any person or twice the pecuniary loss to any person;

(c) A   term of   supervised release of  not more than three years.

(d) Any or all of the above.

 

B.        As     to      Counts    2-9:     Illegal  Access        and Obtaining

 

Information          from        a         Protected           Computer        (18        u.s.c.   §

 

1030 (a) (2) (c) &            (c) (2) (B)  (i)- (iii)):

 

1.    A term of imprisonment of not more than 5 years;

 

2.    A   fine of up to $250,000 or twice the pecuniary gain to any person or twice the pecuniary loss to any person;

3.   A   term of  supervised release of   not more   than

 

three years.

 

C.        As      to       Counts      10-23:       Intentional          Damage   to      a

 

Protected  Computer     (18 U.S. C.   §  1030 (a) (5) (A)   &           (c) (4) (B)) :

 

 

1.   A term of imprisonment of not more than 10 years;

2.    A fine of up to $250,000 or twice the pecuniary gain to any person or twice the pecuniary loss to any person;

 

9


---··   --···

 

Case 2:14-cr-00118-CB     Document 4   Filed 05/01/14    Page 10 of 11

 

 

 

3.   A  term of  supervised release of   not more than three years.

D.        As       to      Counts     24-29:       Aggravated      Identity       Theft

 

 

(18 U.S.C.  §  1028A(a) (1),  (b),            (c) (4)):

1.   A mandatory term of imprisonment of two years to run consecutively with any other term of imprisonment imposed,

 


except  as   stated   in   18  U.S.C.  §      1028A(b)(4)

 

1028A(a)(1), (b));


(18 u.s.c.     §


2.   A fine of up to $250,000 or twice the pecuniary gain or loss to any person;

3.   A term of supervised release of not more than one

 

(1) year;

 

4.    Any or all of the above.

 

E.        As     to     Count     30:        Economic Espionage            (18  U.S. C.  §

 

 

1831(a) (2)) :

 

 

1.   A term of imprisonment of not more than 15 years;

 

2.    A fine of up to $5,000,000;

 

3.   A   term of  supervised release of  not more than three years.

F.        As       to      Count     31:          Theft      of      Trade     Secrets        (18

 

 

U.S.C.  §  1832(a) (2)  &         (4)):

 

 

1.   A term of imprisonment of not more than 10 years;

 

2.   A fine of up to $250,000 or twice the pecuniary gain to any person or twice the pecuniary loss to any person;

 

 

10


Case 2:14-cr-00118-CB     Document 4   Filed 05/01/14    Page 11 of 11

 

 

 

3.     A    term  of   supervised  release   of   not   more  than three years.

IV.       MANDATORY  SPECIAL   ASSESSMENT

 

 

A    mandatory  special    assessment  of   $100.00  must  be imposed at   each  count   upon  which  the   defendant    is   convicted, pursuant  to  18 U.S.C.  §  3013.

V.         RESTITUTION

 

 

Restitution  may     be   required  ln  this   case  as  to  all Counts,  together   with  any  authorized  penalty,   as  part   of  the defendants'  sentence pursuant  to  18  U.S. C.     §§   3663,  3 663A,   and

3664.

 

VI.       FORFEITURE

 

 

Not    applicable in this  case.

 

 

 

Respectfully  submitted,

 

DAVID J. HICKTON

 

 

 

 

 

 

 

s ant  U.S. Attorney

No.    308565

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

11

0%(0)
0%(0)
  这事现在看像是个忽悠 - 西岸 05/19/14 (339)
  自己就是最大的贼,装什么B  /无内容 - 北飞雁 05/19/14 (340)
      人渣装B!每年美国排第一的你等难民最无耻,编各种谎言骗移民官  /无内容 - qwtie66 05/20/14 (250)
        接下来又榨取咱们纳税人交的血汗银子,整个一骗子加好吃懒做税贼  /无内容 - qwtie66 05/20/14 (244)
            那你领的是越南盾还是马拉西亚令吉,可以一个月用不完?  /无内容 - 孤岛 05/20/14 (250)
标 题 (必选项):
内 容 (选填项):
实用资讯
回国机票$360起 | 商务舱省$200 | 全球最佳航空公司出炉:海航获五星
海外华人福利!在线看陈建斌《三叉戟》热血归回 豪情筑梦 高清免费看 无地区限制
一周点击热帖 更多>>
一周回复热帖
历史上的今天:回复热帖
2013: 辽宁渔船在我领海内被北韩扣做人质,我
2013: 西边的太阳快要落山了zt
2012: 中国服役新型4900吨级海监船 已启程赴
2012: 惊人预测:十年后中国海空军的实力超乎
2011: 刘邓大军忍无可忍“乱世用重典” 宋埠
2011: 二千多男人被杀的血腥宋埠事件-刘邓大
2010: 真相终大白!谁还要帮朝鲜这流氓无赖国
2010: 中国四代机成本初步曝光:超越美军F22
2009: 毛泽东与蒋介石谁出卖了外蒙古?
2009: 新疆“三区革命”的真相--64年前的东突