Loading

紅魔爪伸向雷神 --又一個疑似中共間諜落網!

來源:Quartz, February 1, 2020

作者:Justin Rohrlich & Tim Fernholz

新聞翻譯:TCC

導語又一疑似中共國間諜被美國起訴。在雷神導彈公司工作10年的48歲的孫偉(音譯),因涉嫌攜帶美國國防機密文件前往中國而被起訴。其通過了秘密級別的安全檢查,他的工作涉及美國軍方使用的高敏感度導彈項目。定於2月14日出庭的孫偉,最初拒不認罪,現正準備承認有罪。雖然此事是中國竊取外國軍事機密的冰山一角,這案例是在警告那些仍然對中共國俯首稱臣和言聽計從的高級工程師,科學家們,你們已經被國防安全部門盯上了,別再存著佼倖心理,助紂為虐;要看清事實,不然很快將會淪為階下囚。

Raytheon engineer arrested for taking US missile defense secrets to China

雷神工程師因將美國導彈防禦機密帶到中共國而被捕

When Wei Sun, a 48-year-old engineer at Raytheon Missile Systems, left for an overseas trip last year, he told the company he planned to bring his company-issued HP EliteBook 840 laptop along.

去年,雷神導彈系統公司48歲的工程師孫偉(Wei Sun)在一趟出國旅行時告知公司,他將隨身攜帶公司配給的HP EliteBook 840筆記本電腦。

Sun, a Chinese-born American citizen, had been working at Raytheon, the fourth-largest US defense contractor, for a decade. He held a secret-level security clearance and worked on highly sensitive missile programs used by the US military.

出生於中國的美國公民Sun在美國第四大國防承包商雷神公司工作了十年。Sun通過了秘密級別的安全檢查,他的工作涉及美國軍方使用的高敏感度導彈項目。

Since Sun’s computer contained large amounts of classified data, Raytheon officials told him that taking it abroad would not only be a violation of company policy, but a serious violation of federal law, as well.

由於Sun的電腦存有大量機密數據,雷神公司的長官告訴他,將其帶到國外不僅違反公司政策,而且也嚴重違反聯邦法律。

孙获得了敏感的导弹防御技术。

Sun didn’t listen, according to US prosecutors. While he was out of the country, Sun connected to Raytheon’s internal network on the laptop. He sent an email on Jan. 7, suddenly announcing he was quitting his job after 10 years in order to study and work overseas.

根據美國檢察官的陳訴,Sun沒有聽取公司的警告。當他在國外時,Sun用筆記本電腦連接到雷神公司的內部網絡,並於1月7日發送了一封電子郵件,突然宣布他將辭職,以便在海外學習和工作。

When Sun returned to the United States a week later, he told Raytheon security officials that he had only visited Singapore and the Philippines during his travels. But inconsistent stories about his itinerary led Sun to confess that he traveled to China with the laptop.

Sun一周後返回美國時,他告訴雷神公司安全長官,他在旅行期間只到過新加坡和菲律賓。但是,關於行程的前後矛盾的事,導致Sun承認自己帶著筆記本電腦前往了中國。

A Raytheon lawyer examined the machine, and confirmed it contained technical specifications prohibited from export by the International Traffic in Arms Regulations (ITAR), in addition to security software that is itself export-controlled and requires a special license to take outside the United States.

雷神公司的一名律師檢查了這台電腦,並確認該機器包含《國際武器貿易條例》(ITAR)禁止出境的技術規格,以及電腦上裝有受出口管制且需要特殊許可才能帶到美國境外的安全軟件。

Sun was arrested by FBI agents the next day. His attorney, Cameron Morgan, did not respond to a request for comment. Raytheon said only that the company “cooperated with this investigation,” declining to elaborate further.

第二天,Sun被聯邦調查局逮捕。他的律師卡梅倫·摩根(Cameron Morgan)沒有回應置評請求。雷神公司僅表示,該公司“與這項調查合作”,拒絕進一步闡述。

Court documents reviewed by Quartz refer to Sun possessing classified files related to several different air defense systems designed by Raytheon for the US military and sold to American allies and proxies around the world.

Quartz審查法院文件披露,Sun擁有與雷神公司為美國軍方設計的幾種不同的防空系統有關的機密文件。這些是用來出售給世界各地的美國盟友和代理人的。

The case, which has not been reported until now, is yet another example of China’s increasing efforts to acquire American military technology. The country’s security services have already compromised dozens of crucial US weapons systems, such as the Army’s Terminal High Altitude Area Defense (THAAD) ballistic missile defense system, and the Aegis ballistic missile defense system used by the Navy.

該案是中共國極力獲取美國軍事技術的又一例證。中共國的安全部門已經危及到數十種關鍵的美國武器系統,例如美國陸軍的終端高空區域防禦(THAAD)彈道導彈防禦系統和海軍使用的“宙斯盾”彈道導彈防禦系統。

In 2018, Chinese hackers stole top-secret plans for a supersonic anti-ship missile being developed by the Navy known as Sea Dragon. The intruders reportedly managed to get massive amounts of sensitive signals and sensor data, in addition to the Navy’s entire electronic warfare library.

2018年,中共國黑客偷走了由海軍開發被稱為海龍號的超音速反艦導彈的絕密計劃。據報導,除了海軍整個電子戰圖書館之外,中共國黑客還設法獲得了大量敏感信號和感應器數據。

The weapons with which Sun worked are “pretty much top-of-the-line American systems,” according to Dean Cheng, a fellow at the Heritage Foundation who studies China’s military capabilities.

傳統基金會研究中共國軍事能力的研究員迪安·程(Dean Cheng)說,Sun的工作涉及“幾乎是最先進的美國系統”。

The AMRAAM, or Advanced Medium Range Air to Air Missile, is used on US fighter jets like the F-16 and F-22 to destroy other aircraft before they can be seen by anything but radar. It has also been converted into a ground-based air defense system, which may have been Sun’s focus, since prosecutors describe his work as centered on ballistic missile defense.

先進的中程空對空導彈(或AMRAAM)是用於F-16和F-22等美國戰鬥機,在雷達可偵測之前,將其他飛機摧毀。這也已經被轉換成用於地面防空系統,這可能是Sun的工作重點,因為檢察官稱他的工作集中在彈道導彈防禦上。

美国国防承包商雷神公司一名华裔工程师,涉嫌将美国导弹军事机密提供给中共,在美国被捕后正在接受审判。图为陆射巡航导弹飞行试验示意图。(美国国防部图片,公有领域)

The documents also say Raytheon employees will provide testimony about the Stinger missile, a “man-portable” air-defense missile that can be fired by troops on the ground, made most famous when the US supplied it to Afghan warlords fighting against occupying Soviet troops.

文件還說,雷神公司的員工將提供有關“毒刺”導彈的證詞,“毒刺”導彈是一種“便攜式”防空導彈,可以由地面部隊發射。最為著名的例子是美國提供給阿富汗軍閥來抵抗占領的蘇軍時所使用的武器。

Perhaps most significant is Sun’s involvement with the Redesigned Kill Vehicle (RKV) program, an effort to replace the interceptor used by US air defense systems to shoot down incoming ballistic missiles.

也許最重要的是Sun參與了“重新設計的殺傷車輛(RKV)”項目,該項目旨在取代美國防空系統用來擊落來襲彈道導彈的攔截器。

The Pentagon cancelled the program last year because of technical problems, but information about the project would still be useful to China to understand what the US might do to defend from conventional or nuclear missiles. Missile technology has become central to Beijing’s strategy to deter US power (Quartz member exclusive) in the Pacific, making up for deficiencies and a lack of experience with weapons systems like jet fighters.

五角大樓去年由於技術問題取消了該項目,但是有關該項目的信息對於中共國了解美國為抵禦常規導彈或核導彈可能採取的措施仍然有用。導彈技術已成為北京遏制美國在太平洋上的力量(QUARTZ獨家)的中心,並彌補噴氣戰鬥機的缺陷和對武器系統的缺乏經驗。

China would be eager to learn how to defeat the missiles by understanding the technical details of how they find their targets with radar and other sensors, and how they respond to attempts to jam or distract them, Cheng told Quartz.

程對QUARTZ說,中共國渴望通過了解如何通過雷達和其他傳感器找到目標的技術細節,以及它們如何應對乾擾或分散干擾的努力,來學習如何擊中導彈。

China already has its own equivalents of these weapons, so it’s not necessarily seeking to copy US technology. However, as one example, China’s advanced air-to-air missile has never been used in combat, while the AMRAAM has, so its design may offer lessons that China’s defense industrial base has yet to learn.

中共國已經擁有這些同等級武器,因此它不一定要復製美國的技術。但是,舉個例子,中共國先進的空對空導彈從未用於戰鬥,而AMRAAM則有實戰經驗,因此其設計可能會提供中共國國防工業基礎尚未學習的經驗教訓。

Cheng said this is “one piece of the larger Chinese espionage picture…we tend to focus on Chinese cyber [but] they have human intelligence, they have people trying to steal examples of it in other countries as well.”

程說,這只是“中共國間諜活動的一小部份……我們傾向於專注於中國網絡[但是]他們有間諜,他們也有人試圖在其他國家竊取像這類的軍方機密。”

None of the documents shed any light on Sun’s co-conspirators, if any, and it’s not clear if Sun was acting at the behest of Chinese intelligence.

這些文件都沒有提到Sun的同謀(如果有的話),也不清楚Sun是否按照中國情報的要求行事。

“I can assume that Chinese government agencies are keeping their eye on former citizens who are working in big US companies [like Raytheon],” said Janosh Neumann, a former counterintelligence officer with Russia’s Federal Security Service who now lives in the United States.

“我認爲中共國政府機構正在關注像雷神公司等大型美國公司工作的前中國公民,”現居住在美國前對俄羅斯聯邦安全局反情報官員賈諾什·諾伊曼(Janosh Neumann)說。

Regardless, William Mackie, the lead prosecutor on the Sun case, said someone like Sun can do damage without directly cooperating with anyone. The files Sun allegedly took out of the country could have just as easily been purloined by an adversarial spy service without the engineer’s knowledge.

無論如何,Sun案的首席檢察官William Mackie表示,像Sun這樣的人可以在不與任何人直接合作的情況下損害(美國利益)。 Sun涉嫌帶出的美國文件会在工程師不知情的情況下,很容易被對立的間諜服務單位所竊走。

“If your computer gets left in a hotel room, somebody could image the whole thing and you’d never know it,” Mackie told Quartz. “There’s always the risk of something like that—no different than if somebody took pictures or copies of blueprints or a paper file.”

Mackie告訴QUARTZ,“如果您的計算機留在旅館房間裡,那麼有人可以複製計算機內的所有內容,而您將一無所知。” “總會有這樣的風險,就像有人拍了照片或藍圖的影本或文件。”

Legal filings suggest that Sun, who initially pleaded not guilty, is preparing to change his plea to guilty as part of an agreement with the Department of Justice. He is scheduled to appear in court on Feb. 14.

法律文件顯示,最初Sun沒有認罪,现正在準備請求改成有罪,這是與司法部達成協議的一部分。他定於2月14日出庭。

編輯:【喜馬拉雅戰鷹團】