Post by Resty WysePost by w***@yahoo.com.sgThis shows that Chinese-Americans are loyal Americans -- not spies.
Hey!!! I worked on America's weapon systems.
Which weapon system did you work on, Yale Guen Mar?
As a janitor in the cafe for Dynalectron employees, you had access to the cleaning mops. Is that the weapon systems that you are talking of?
Post by Resty WyseAll family members are in the U.S.
If the U.S. boat sinks, we all go down with it.
When did you start caring for family members, Yale Guen Mar?
Post by Resty WyseI haven't seen my children, my grand-children for years, Satish.
They don't want to come to a small town.
I don't want to go to a big city!!!!
And I have not seen any of my sibblings for many many years.
In other words, you couldn't care less if the boat with all your family members does sink. Isn't that right, Yale Guen Mar?
Post by Resty WysePost by w***@yahoo.com.sgThe propaganda that all Chinese Americans are Chinese spies or potential spies is bullshit.
Yes, yes,...
Chinese-Americans are by and large a patriotic lot. But there are a few bad apples who go proactive with their bid to serve the colonial agenda of CCP-dictatorship. These bad apples had often worked with defense contractors like Lockheed, Boeing etc. but when opportunity came they betrayed USA by selling company and US secrets to the CCP- dictatorship. When caught, these bad apples inevitably landed in jail.
Yale Guen Mar, you get paid 50 cents per approved post by the CCP for your contribution toward guiding public opinion.
Yale Guen Mar, you have a penchant for pulling down your pants and sitting on a unique perch - the taro patches of your Hmong neighbors on Twilight Avenue in Merced, CA.
Yale Guen Mar, you receive 50 cents per approved post from the CCP. But you are lucky that USA guarantees you your freedom of speech and doesn't bother do to you what the CCP does to dissidents in PRC.
It would not be a bad idea to lock up Yale Guen Mar (who posts under the fake name of Resty Wyse) in Guantanamo.
Yale Guen Mar (posting under the fake name of Resty Wyse) is conspicuous among patriotic Chinese-Americans as an absolutely rotten apple - Yale Guen Mar is selling away his country for 50 cents per approved post from the Chinese Communist Party (CCP) dictatorship in Beijing.
Yale Guen Mar, USA respects your freedom of speech. Unlike the CCP-dictatorship in China, the US government is not going to monitor your posts on the newsgroup and go after you for your rantings on the internet. You can bark with impunity without any fear of reprisal by the US government. But you will make a grave mistake if you ever try to bite the hand that feeds you. You will be eventually caught and spend the rest of your golden years inside jail cells.
Yale Guen Mar, try to be like the normal Chinese-Americans. Ambassador Gary Locke is a good role model. He had won nothing but admiration from the ordinary Chinese under CCP-dictatorship.He was far more respected by the ordinary folks in China than the stinking fat cats in the party politburo.
As a 80-year old hag, you have ample time in your hand. Your idle brain has become the devil's workshop. You are 24/7 on the internet pushing the evil agenda of the CCP-dictatorship in China. But if you have any brain, you will bark but not bite to avoid ending up in jail like a few Chinese Americans have for selling US to the CCP- dictatorship in China for pecuniary gains.
China-born aerospace engineer Dogfang Greg Chung is the same age as 80-year old Yale Guen Mar. Yale Guen Mar would be wise to steer himself away from the path of treason that has earned the 80-year old Dongfan Gref Chung a 15 year prison sentence. Here's his shameful story:
****************
http://articles.latimes.com/2010/feb/09/local/la-me-chinese-spy9-2010feb09
9-2-2010
Chinese-born engineer gets 15 years in spying for China
Dongfan 'Greg' Chung, who worked with Boeing and Rockwell International, was accused of providing information on the space shuttle and Delta IV rocket.
By Patrick J. McDonnell
A Chinese-born aerospace engineer who had access to sensitive material while working with a pair of major defense contractors in Southern California was sentenced Monday to more than 15 years in prison for acquiring secret space shuttle data and other information for China.
U.S. District Judge Cormac J. Carney in Santa Ana imposed a 188-month prison term on Dongfan "Greg" Chung, 73, a naturalized U.S. citizen who lives in Orange.
Carney declared that he could not "put a price tag" on national security and sought to send a signal to China to "stop sending your spies here," according to the U.S. attorney's office.
Chung, who worked at Boeing's Huntington Beach plant, denied being a spy and said he was gathering documents for a book, not for espionage. His attorneys argued that much of the material was already available on the public record.
At his sentencing, Chung professed his love for the United States, even as prosecutors depicted him as a spy who would compromise U.S. national security.
"Giving China advanced rocket technology is not in the United States' national interest," said Assistant U.S. Atty. Greg Staples. "There is a voracious appetite for U.S. technology in China."
Whether loyalty to his homeland or financial gain was Chung's motive remained unclear. The case is one of a number of prosecutions that have shed light on alleged Chinese efforts to gain access to U.S. technology and research through espionage.
Chung was the first suspect tried with attempting to help a foreign nation under the terms of the 1996 Economic Espionage Act, passed to help prevent pilfering of sensitive economic information. Chung chose to have the case heard by the judge rather than a jury.
Chung was convicted last year on charges of economic espionage and acting as an agent for more than three decades while employed by Rockwell International and Boeing Co.
When Chung was convicted, Carney said the case revealed Chung's "secret life" as a "spy" for China. The case against him arose from an investigation into another engineer, Chi Mak, who worked in the United States and obtained sensitive military information for China. Mak and several relatives were convicted of providing defense information to China, the U.S. attorney's office said. Carney sentenced Mak to more than 24 years in prison in 2008.
Federal authorities said Chung stole restricted technology and trade secrets, including data related to the space shuttle and the Delta IV rocket.
"This case demonstrates our resolve to protect the secrets that help protect the United States, as well as the important technology advancements developed by scientists working for companies that provide crucial support to our national security programs," acting U.S. Atty. George S. Cardona said Monday in a statement.
Chung held a "secret" security clearance when he worked at Rockwell and Boeing on the space shuttle program, authorities said. He retired in 2002 but the next year returned to Boeing as a contractor, a position he held until September 2006, the U.S. attorney's office said.
Between 1985 and 2003, Chung made trips to China to deliver lectures on technology involving the space shuttle and other programs, the government said. During those trips, Chung met with Chinese government officials, including military agents, U.S. authorities said.
***************
China under CCP-dictatorship is picking up fights with its neighbors for the purpose of making territorial claims on the Yellow Sea and the South Sea.The bandit rgime in Beijing, like Nazi Germany and Tojo's Japan, is being driven by sheer arrogance and greed.
Pride goeth before a fall. Imperialist ambitions are guiding CCP big honchos to lead China on to a very slippery path.
As for you, rst, I can't even call you brainwashed because you have a very very dirty brain. Your support for CCP-dictatorship's imperialist agenda is totally opportunistic and not of belief.
You became a naturalized American many decades ago. You did so on your own. No one forced you to become an American citizen. And you know enough of life under CCP-dictatorship not to want to ever move back to the land of your birth. You intend to stay put in USA with your gf.
And yet you choose to incessantly cheer the CCP-dictatorship. That is a sure sign of a very very dirty brain.
***************************
https://www.washingtonpost.com/news/morning-mix/wp/2018/07/11/ex-apple-engineer-arrested-on-his-way-to-china-charged-with-stealing-companys-autonomous-car-secrets/?utm_term=.8014a62950b4
Washington Post
July 11, 2018
Ex-Apple engineer arrested on his way to China, charged with stealing company’s autonomous car secrets
For about two years, Xiaolang Zhang was privy to information to which many in the tech world can only dream of having access: the inner workings of Apple’s secretive autonomous car research.
During the weekend, the former Apple engineer was arrested by U.S. authorities at San Jose International Airport while preparing to board a flight to China and charged with stealing proprietary information related to Apple’s self-driving car project. At the time of his arrest, he said he was working for a Chinese start-up that is also developing autonomous vehicles, according to a criminal complaint filed in federal court in San Jose on Monday by the FBI and the U.S. attorney’s office.
Zhang, who started working at Apple in December 2015, was accused of downloading files that included engineering schematics and technical reports before leaving to work for Xiaopeng Motors, a Guangzhou-based company also known as XMotors, documents said.
A statement Wednesday from XMotors said there was no indication that Zhang communicated sensitive information from Apple, the Reuters news agency reported. XMotors added it was informed of the case late last month and was working with local authorities on the probe.
As a hardware engineer on Apple’s autonomous vehicle development team, Zhang’s position granted him “broad access to secure and confidential internal databases containing trade secrets and intellectual property,” according to the complaint.
Aside from making general comments about its interest in developing self-driving technology, Apple hasn’t openly discussed its research, leaving many to wonder what exactly the company is working on. Information is even kept from a majority of the company’s employees. About 5,000 employees out of more than 135,000 are “disclosed” on the project, meaning they are working on the project or know details about it, the complaint said. Fewer people, about 2,700 “core employees,” have access to the project’s databases.
According to the complaint, information about the project “is a closely guarded secret that has never been publicly revealed.”
“Apple takes confidentiality and the protection of our intellectual property very seriously,” company spokesman Tom Neumayr told Bloomberg in an email. “We’re working with authorities on this matter and will do everything possible to make sure this individual and any other individuals involved are held accountable for their actions.”
Zhang appeared in court Monday and was remanded to custody, according to court documents. A plea has not yet been filed. Tamara Crepet, a federal public defender provisionally appointed to represent Zhang, could not be reached for comment.
The complaint states Apple first became suspicious of Zhang in late April. Zhang had just returned to the company after taking paternity leave when he informed his supervisor on April 30 that he would be resigning, according to the complaint. He said he wanted to move back to China, citing his mother’s poor health as the reason, but later disclosed he intended to work for XMotors, the FBI complaint said. Shortly before this meeting and while on leave, authorities say Zhang had taken a trip to China with his family.
An internal investigation revealed that in the days before Zhang’s resignation, his Apple network activity “increased exponentially,” the complaint said. Authorities allege Zhang had downloaded “copious pages of information” from various confidential databases. Records and closed-circuit TV footage also showed Zhang entering the autonomous car software and hardware labs on April 28, documents state. He was seen leaving less than an hour later carrying a computer keyboard, some cables and a large box.
Armed with that evidence, Apple called Zhang in for a second interview on May 2.
He initially denied going to Apple’s labs to take anything. But Zhang later admitted taking two circuit boards and a server, according to documents. He also admitted to using AirDrop, a file transferring system for Apple devices, to upload company data to his wife’s personal laptop, the complaint said. Zhang explained he had taken the hardware because he thought it would be useful to him on another project. As for the files, he said he had wanted to study the data on his own time. Additionally, Zhang revealed he had been working to secure a job with XMotors while still employed by Apple.
After examining his wife’s laptop, Apple’s digital forensic investigations team discovered that more than half the data on the computer was “highly-problematic,” the complaint said. A complete evaluation of the files is ongoing.
Effective May 5, Zhang was “voluntarily terminated,” and according to the complaint, said he is employed by XMotors at its Mountain View, Calif., office. He also told Apple investigators he plans to move his family to Guangzhou, China, “in the near future,” the complaint said.
On July 7, authorities learned Zhang had bought “a last-minute round-trip airline ticket” for himself to Beijing, with the final destination of Hangzhou, China. The flight was scheduled to depart that same day. At the airport, Zhang was intercepted by federal agents and “arrested without incident.”
Zhang is scheduled to be arraigned July 27, according to court documents. If found guilty, he could face 10 years in prison along with a $250,000 fine.
**************************
http://www.washingtonpost.com/world/national-security/chinese-citizen-sentenced-in-military-data-theft-case/2013/03/25/dc4567fa-9593-11e2-ae32-9ef60436f5c1_story.html
Washington Post
March 25, 2013
Chinese citizen sentenced in military data-theft case
By Peter Finn, Published: March 25
NEWARK, N.J. — Measured in millimeters, the tiny device was designed to allow drones, missiles and rockets to hit targets without satellite guidance. An advanced version was being developed secretly for the U.S. military by a small company and L-3 Communications, a major defense contractor.
On Monday, Sixing Liu, a Chinese citizen who worked at L-3’s space and navigation division, was sentenced in federal court here to five years and 10 months for taking thousands of files about the device, called a disk resonator gyroscope, and other defense systems to China in violation of a U.S. arms embargo.
The case illustrates what the FBI calls a growing “insider threat” that hasn’t drawn as much attention as Chinese cyber operations. But U.S. authorities warned that this type of espionage can be just as damaging to national security and American business.
“The reason this technology is on the State Department munitions list, and controlled . . . is it can navigate, control and position missiles, aircraft, drones, bombs, lasers and targets very accurately,” said David Smukowski, president of Sensors in Motion, the small company in Bellvue, Wash., developing the technology with L-3. “While it saves lives, it can also be very strategic. It is rocket science.”
Smukowski estimated that the loss of this tiny piece of technology alone could ultimately cost the U.S. military hundreds of millions of dollars.
In the past four years, nearly 100 individual or corporate defendants have been charged by the Justice Department with stealing trade secrets or classified information for Chinese entities or exporting military or dual-use technology to China, according to court records. A number of other cases involving China remain under seal, according to the Justice Department.
The targets of all this theft are some of the biggest and best-known U.S. defense contractors and private companies, with household names such as Northrop Grumman, Boeing, General Dynamics, Ford, DuPont and Dow Chemical.
“America is a global leader in the development of military technologies and, as such, it has become a leading target for the theft and illicit transfer of such technologies,” said John Carlin, acting assistant attorney general for national security. “These schemes represent a threat to our national security. The intelligence community has assessed China to be among the most aggressive collectors of sensitive U.S. information and technologies and our criminal prosecutions across the country reflect that assessment.”
Earlier this month, a Chinese citizen who worked as a contractor at NASA’s Langley Research Center was arrested at Dulles Airport and charged with making false statements to federal agents about the laptop and SIM card he was carrying. According to an FBI affidavit, the suspect, Bo Jiang, 31, had taken a NASA laptop that contained sensitive information on a previous trip to China.
Following the arrest, Maj. Gen. Charles F. Bolden Jr., the NASA administrator, told a House committee that he was limiting access to NASA for the citizens of several countries, including China, pending a full security review.
In a classic espionage case, a 59-year-old former Army defense contractor in Hawaii was charged this month with passing classified information to his 27-year-old Chinese lover whom he first met at a military conference.
Benjamin Pierce Bishop, a former Army officer with a top-secret security clearance, worked at U.S. Pacific Command as a contractor. He is accused of turning over information about nuclear weapons, missile defense, and radar systems. The woman may have attended the conference “to target individuals . . . who work with and have access to U.S. classified information,” according to an FBI affidavit.
Last year, the FBI began a public campaign to alert the defense industry and other businesses to the “insider threat.” As part of the effort, billboards were placed along commuter corridors near nine leading research centers.
C. Frank Figliuzzi, the former head of the FBI’s Counterintelligence Division, told Congress last year that perhaps the most important measure against the theft of proprietary information “is identifying and taking defensive measures against employees.”
Liu, who holds a doctorate in electrical engineering, came to the United States in 1993 and held a series of jobs at Bandag and Primex, tire manufacturers, and John Deere. In 2009, he went to work at L-3’s space and navigation division in northern New Jersey, where he was part of a team of engineers testing the technology created by Sensors in Motion, a pioneer in gyroscope-based navigation and guidance systems.
Liu made two trips to China, in 2009 and 2010, and each time he made several presentations on the technology he was working on without the permission of his employers, according to prosecutors. Before the second trip, in November 2010, Liu made an electronic archive of his work e-mail and transferred it to his personal computer along with the entire Sensors in Motion program folder, according to court records.
Liu told his supervisor he was going on vacation to Chicago, but instead he spent more than two weeks in China, speaking at a technology conference organized by the Chinese government and Chinese universities, prosecutors said.
Federal prosecutors said that Liu was in China to use his knowledge about cutting-edge defense technology get a job at a premier Chinese aeronautical institute. Along with thousands of proprietary documents, Liu’s computer contained a lengthy résuméof 25 projects on which he had worked for L-3; each project was identified by its connection to the U.S. military, according to court records.
Liu was stopped on his return from China in November 2010 and eventually arrested in March 2011. After a jury trial, Liu was convicted last September of violating the Arms Export Control Act and possessing and transporting stolen trade secrets.
In court Wednesday, Liu, the 50-year-old father of three, including two U.S. citizens, told the judge that he did not intend to harm the United States and suggested that the case was a political prosecution.
Addressing the judge before sentencing, he said he had a message for his children, “Believe me, Daddy didn’t do anything.”
Liu’s attorney, James D. Tunick, interrupted his client’s rambling speech several times, apparently to get Liu to tone down assertions that the case was political. Tunick had previously argued that Liu “only revealed very limited information in China” and the downloaded documents were for the scientist’s “own personal knowledge.”
“Doctor, this is not a political prosecution,” said U.S. District Court Judge Stanley R. Chesler who ruled that Liu’s actions benefited the Chinese government. He noted that Liu downloaded documents for programs in which he had no involvement, though the judge said Liu knew “just how sensitive the material he had was.”
When FBI agents raided Liu’s house in March 2011, they found proprietary material from Bandag, Primex and John Deere as well as L-3. “We believe Sixing Liu was a serial thief,” said Assistant U.S. Attorney L. Judson Welle, who had asked for an eight-year sentence.
Officials from the other companies declined to comment or did not respond to requests from The Washington Post. But Smukowski of Sensors in Motion said: “What a tragedy all around. For us, for him, and for American technology prowess.”
*******************
http://www.newser.com/article/da0v55100/chinese-born-american-sentenced-to-4-years-in-prison-for-stealing-trade-secrets-from-motorola.html
AFP
August 29, 2012
Chinese-born American sentenced to 4 years in prison for stealing trade secrets from Motorola
Motorola trade secrets thief gets 4-year term
By JASON KEYSER
A Chinese-born American convicted of stealing trade secrets from Motorola was sentenced Wednesday to 4 years in prison in a case that prosecutors hoped would send a message to those who might be tempted to siphon vital information from U.S. companies.
Hanjuan Jin, who worked as a software engineer for Motorola Inc. for nine years, was stopped during a random security search at O'Hare International Airport on Feb. 28, 2007, before she could board a flight to China. Prosecutors say she was carrying $31,000 and hundreds of confidential Motorola documents, many stored on a laptop, four external hard drives, thumb drives and other devices.
U.S. District Judge Ruben Castillo found Jin guilty in February of stealing trade secrets but acquitted her of more serious charges of economic espionage, explaining that the evidence fell short of proving she stole the information on behalf of a foreign government or entity.
Prosecutors alleged that among the secrets she carried were descriptions of a walkie-talkie type feature on Motorola cellphones that prosecutors argued would have benefited the Chinese military.
Jin's lawyers say the naturalized U.S. citizen was not an agent of China and took the files merely to refresh her knowledge after a long absence from work. They asked the judge for probation and said in a court filing last week that "Jin has overwhelming remorse and regret" for her actions and "continues to suffer from the collateral consequences of her admittedly poor choice."
After her conviction, prosecutors said they hoped the ruling would send a message that such crimes come with heavy penalties. They said they also hoped the trial would demonstrate to U.S. companies that they can report such crimes and not risk their trade secrets being revealed in court.
Prosecutors say the former University of Notre Dame graduate student began downloading files at her Chicago-area Motorola office after returning from an extended medical leave just a few days earlier.
During the trial, prosecutor Christopher Stetler told the court that Jin "led a double life" as a seemingly loyal company worker who was actually plotting to steal her employer's secrets.
Even before returning to Motorola to download files over the several days in February 2007 prosecutors say Jin had already begun working for China-based Sun Kaisens, a telecommunications firm that government attorneys say develops products for China's military.
But the defense insisted Jin harbored no ill intent and merely grabbed the files to refresh her technical knowledge after her long absence from work. They also said prosecutors overvalued the technology in question, saying the walkie-talkie feature is no longer cutting edge and would have been of little military value.
In his February ruling, Judge Castillo wrote that the government hadn't met several requirements to prove economic espionage, including clearly demonstrating that Jin knew the materials she stole could benefit China or its military.
Jin was allowed to remain free pending Wednesday's sentencing, though she had to wear electronic monitoring and was confined to her Aurora home.
Motorola Inc. has since become Motorola Solutions Inc., in suburban Schaumburg.
*************