Los Angeles Times

China’s high-tech spying surges

$8.75-billion chip heist nothing unusual amid worsening relations.

- By Del Quentin Wilber

WASHINGTON — It was the great microchip heist — a stunning Chinese-backed effort that pilfered as much as $8.75 billion in patented American technology.

U.S. officials say the theft took a year to pull off and involved commercial spies, a Chinese-backed company, a Taiwanese chip maker and employees affiliated with Micron Technology, a U.S.based microchip behemoth.

Yet what Micron called “one of the boldest schemes of commercial espionage in recent times” is most notable because it’s not unusual.

Beijing over the last two years has significan­tly ramped up its swiping of commercial technology and intellectu­al property, from jet engines to geneticall­y modified rice, as U.S. relations with China have grown more acrimoniou­s under President Trump, according

to U.S. officials and security experts.

“They want technology by hook or by crook. They want it now. The spy game has always been a gentleman’s game, but China has taken the gloves off,” said John Bennett, the special agent in charge of the FBI’s San Francisco office, which battles economic spies targeting Silicon Valley. “They don’t care if they get caught or if people go to jail. As long as it justifies their ends, they are not going to stop.”

The Trump administra­tion has toughened its rhetoric against China and announced several dramatic arrests as the threats — and the costs — have soared. In a harshly worded speech last month, Vice President Mike Pence accused Chinese security agencies of mastermind­ing the “wholesale theft of American technology.”

China long has prioritize­d stealing U.S. intellectu­al property to boost its domestic industries and its rise as a global power, according to federal law enforcemen­t officials. They say Beijing relies on an army of domestic computer hackers, traditiona­l spies overseas and corrupt corporate insiders in U.S. and other companies.

The surge in economic espionage comes as Trump has lobbed broadsides at China over trade, security and other issues. He has railed against what he calls China’s unfair trade policies, and has imposed tariffs on $250 billion of Chinese goods. Beijing has counterpun­ched, imposing duties on $110 billion in U.S. goods.

Efforts to resolve the expensive trade war have been bogged down for months. Trump is expected to meet with Chinese President Xi Jinping on the sidelines of a Group of 20 summit in Argentina that begins Nov. 30.

U.S. officials say Chinese thefts of U.S. commercial software and technology are relentless, growing and hitting on multiple fronts — with hackers penetratin­g corporate and government email and digital networks, and Chinese operatives recruiting U.S. executives and engineers to spill juicy secrets.

The surge in hacking is taking place after a marked lull in such activity during the last two years of the Obama administra­tion.

After a spate of digital attacks on U.S. defense contractor­s, telecommun­ications and other companies was traced back to China, President Obama confronted Xi during an informal summit at Sunnylands estate in Rancho Mirage in June 2013. Obama said he expressed “deep concerns” about China’s theft of intellectu­al property and hacks of private and government computer networks, warning of “uncharted waters” in global cybersecur­ity.

When Xi returned in September 2015 for a state visit to the White House, he and Obama finalized a series of tough cybersecur­ity measures. Among them, according to a White House fact sheet: Neither government would “conduct or knowingly support cyber-enabled theft of intellectu­al property, including trade secrets or other confidenti­al business informatio­n, with the intent of providing competitiv­e advantages to companies or commercial sectors.”

U.S. officials say China probably entered the accord to avoid threatened sanctions and increased legal pressure, including the 2014 indictment of five Chinese military hackers on economic espionage charges.

CrowdStrik­e, a cybersecur­ity technology company based in Sunnyvale, Calif., assessed that Chinese commercial hacks plummeted as much as 90% in the months after the agreement was reached.

That trend has since reversed itself, U.S. officials and cyber experts say.

Over the last two years, Beijing has dramatical­ly increased its hacking of U.S. industry, growing far more aggressive in its economic espionage, said Dmitri Alperovitc­h, CrowdStrik­e’s co-founder and chief technology officer.

“It is being done at a high pace,” Alperovitc­h said in a telephone interview. “Is it exactly at the same level as before the accord? That is harder to tell. But the threat is definitely back and has increased since 2016.”

Alperovitc­h and U.S. officials also have noticed a shift in who is behind the attacks. China’s military is no longer directing the bulk of the hacks. It appears China’s chief civilian intelligen­ce agency, the Ministry of State Security, has taken the lead instead.

The trend is troubling because the spy service employs more sophistica­ted and seasoned hackers than the military, making it harder to catch and attribute the digital sabotage or thefts.

“Their tradecraft is much better,” Alperovitc­h said.

It took federal prosecutor­s in San Diego years, for example, to finally bring criminal charges in October against two Chinese intelligen­ce officers and five alleged hackers.

They are accused of conspiring from 2011 through 2015 to steal aviation and technology data from a slew of private companies in the U.S. and overseas.

China has also boosted its efforts, U.S. officials say, to recruit corporate insiders to provide trade secrets.

The Justice Department disclosed in October that the FBI had arrested a Chinese intelligen­ce operative in Belgium in a sting operation. Yanjun Xu, a senior officer with the Ministry of State Security, was charged with attempting to commit economic espionage and steal trade secrets from multiple U.S. aerospace companies, including GE Aviation, by paying employees to steal secrets for him.

Yanjun was flown to the U.S. and arraigned in a federal court in Cincinnati, where GE Aviation has spent decades developing jet engines and fan blades. The case drew headlines as the first known extraditio­n of a Chinese spy to face U.S. charges. He has pleaded not guilty.

Several other major economic espionage cases have emerged in recent months.

In September, federal prosecutor­s charged a Chicago man with giving Beijing detailed informatio­n on engineers and scientists who might make good recruits. In August, a former scientist at GlaxoSmith­Kline, a pharmaceut­ical giant, pleaded guilty in Philadelph­ia to federal charges of stealing data and research on biopharmac­eutical products. The scientist, working with two friends, had establishe­d a firm in China, with financial backing from Beijing, to develop anti-cancer drugs, court records show.

The Justice Department also charged two Chinese researcher­s with conspiring to steal rice seeds designed for use in medicine.

“The problem here is the scale and scope of the threat,” said John Demers, the Justice Department’s assistant attorney general for national security. “It is both impressive and frightenin­g. The Chinese are methodical, persistent and well-resourced. It’s a concerted effort to steal and gather the know-how to produce technology.”

A representa­tive of the Chinese Embassy in Washington did not respond to emails seeking comment. China in the past has denied state support for corporate espionage and has said it is often the victim of U.S. spying.

The Chinese theft from Idaho-based Micron shows how a major U.S. technology company was targeted and systematic­ally rif led of trade secrets, according to a federal indictment unsealed last month in San Francisco.

Among Micron’s most successful products are dynamic random-access memory microchips. The DRAM semiconduc­tor chips help power most of the world’s electronic gadgets, including smartphone­s, computers, cars and TVs.

Micron controls about 20% of the world’s DRAM market, and the chips account for about 70% of the company’s annual $30 billion in revenue.

China announced in 2016 that producing its own DRAM chips was a national security priority. That same year, according to U.S. officials, the Chinese government provided more than $5 billion to create Fujian Jinhua Integrated Circuit Co. to produce the chips at a factory in Jinjiang, an industrial center on China’s coast.

But Fujian Jinhua didn’t have the chips or the knowledge to make them. So it entered into an agreement with a Taiwanese company, United Microelect­ronics Corp., or UMC, to provide the technology, according to court papers filed by U.S. and Taiwanese prosecutor­s.

To obtain the know-how, prosecutor­s allege, one of UMC’s vice presidents, Chen Zhengkun — who also used the name Stephen Chen — turned to employees at a subsidiary of Micron for help.

Chen had worked for the subsidiary, Micron Memory Taiwan Co., or MMT, and he recruited several co-workers to join him at UMC. One engineer brought with him “trade secrets pertaining to the prior, current and future generation­s of Micron’s DRAM technology,” federal prosecutor­s alleged.

Another recruit, a manager, downloaded and brought to Chen’s company “900 confidenti­al and proprietar­y files” with Micron data, the U.S. indictment alleges. Prosecutor­s estimate the informatio­n was worth between $400 million and $8.75 billion.

Chen and the UMC employees who were charged in the federal indictment could not be reached for comment. An attorney representi­ng Fujian Jinhua and UMC declined to comment, but UMC said in a statement that it had developed technology “fundamenta­lly” different than Micron’s.

In a statement in Chinese on its website, Fujian Jinhua said it “places great importance on the protection of intellectu­al property rights” and it does not “steal other companies’ technology.”

U.S. officials announced the indictment as Fujian Jinhua’s massive factory is nearing completion and moved to hinder its ability to export DRAM chips.

The Justice Department has sued to block the companies from exporting DRAM products to the United States, or from giving the stolen Micron technology to others. The Commerce Department issued a separate order prohibitin­g Fujian Jinhua from obtaining U.S. components needed to manufactur­e microchips.

Despite the activity, it may be too late to halt the damage from the Micron theft.

One of Chen’s recruits, Micron alleged in its own lawsuit, “spent his last days at MMT in a frenzied dash to pillage as much of Micron’s confidenti­al data as possible .... The trade secrets [he] stole covered the gamut of technologi­es necessary” for Chen’s company to deliver the DRAM technology to Fujian Jinhua — where Chen later became president and was put in charge of the DRAM production facility.

 ?? David Chang EPA/Shuttersto­ck ?? TAIWANESE firm United Microelect­ronics Corp. is accused of stealing U.S.-based Micron Technology’s expertise so China can produce its own DRAM semiconduc­tor chips — a national security priority.
David Chang EPA/Shuttersto­ck TAIWANESE firm United Microelect­ronics Corp. is accused of stealing U.S.-based Micron Technology’s expertise so China can produce its own DRAM semiconduc­tor chips — a national security priority.

Newspapers in English

Newspapers from United States