Knowledge (XXG)

Xiang Li (hacker)

Source đź“ť

36: 363:
A federal grand jury indicted Li on multiple federal charges involving the sale of more than $ 100 million in stolen software. The $ 100 million figure was based on the results from search warrants executed on Xiang Li's email accounts, which revealed about 600 illegal transactions between April 2008
399:
The court noted the extensive amount of crime that the defendant was engaged in, finding: "This was nothing less than a crime spree, and it was brazen." The court found that the software was "highly sophisticated" and "ended up with individuals and sometimes in countries that are not authorized to
347:
The agents asked if Xiang Li could get software in addition to what he had listed on CRACK99. "I mean as long as can tell me the name," Li said, "I could find a way to get it ...." Xiang Li asked the agents: "I want to ask a question. … Will customers be able to find me? Will be also contacting
395:
is not a defense, and pointed the court to a report estimating that China's illegal software market reached $ 9 billion in 2011, out of a total market of nearly $ 12 billion, thus setting a piracy rate of 77 percent. The government emphasized the advanced nature of the software sold by Li and the
337:," explained Li, "I was thinking would be difficult to pass through the custom." This data included military and civilian aircraft image models, a software module containing data associated with the 344:
Li further advised the undercover agents: "Don’' just sell it … randomly! … Only the familiar and reliable customers… The products…are pretty…um…like confidential. … go and tell other people."
400:
have those software materials". The court sentenced Li to 12 years in prison, the longest criminal copyright sentence ever imposed. The Xiang Li case was featured in the
634: 587: 635:"Chief Scientist Of Government Contractor Sentenced To One Year In Prison For Conspiring To Obtain Pirated Software From Chinese And Russian Cybercriminals" 53: 44: 660: 471: 387:
was "prevalent" in China, opining that "robably ten million people in China are doing things illegally with software." The U.S. government agreed that
737: 279: 416:
Li sold software worth over $ 600,000 to Dr. Ronald Best, the “Chief Scientist” of a U.S. defense contractor involved in applications such as
661:"Chinese Citizen Sentenced To 12 Years In Prison For Cyber-Theft And Piracy Of Over $ 100 Million In Sensitive Software And Proprietary Data" 497: 472:"Chinese Citizen Sentenced to 12 Years in Prison for Cyber-Theft and Piracy of over $ 100 Million in Sensitive Software and Proprietary Data" 732: 271: 130: 60: 306:
U.S. undercover agents posed as criminals who were reselling software obtained from CRACK99. Li and the agents engaged in lengthy
614: 742: 447:
Another U.S. customer was Cosburn Wedderburn, who purchased over $ 1,000,000 in stolen software. At the time, Wedderburn was a
369: 111: 437: 162: 83: 270:
to simulate missile launches and flight trajectories of aircraft and satellites. AGI brought this fact to the attention of
727: 90: 338: 238: 49: 441: 295: 97: 209:
From Chengdu, he operated "CRACK99", a website that sold stolen software globally from 2008 until his arrest by
557:"FOR THE DISTRICT OF DELAWARE UNITED STATES OF AMERICA, Plaintiff, Cr. A. No. 10-112-LPS v. XIANGLI, Defendant" 405: 314:
conversations about increasing sales by expanding the U.S. market. Ultimately, Li agreed to meet the agents in
686: 79: 722: 352: 275: 246: 234: 222: 556: 717: 283: 417: 262:
One of the software titles for sale on CRACK99 was "Satellite Tool Kit 8.0" ("STK"), now known as
327: 68: 291: 218: 104: 531: 429: 318:
to discuss future business opportunities. On June 6, 2011, Li met with undercover agents in
287: 263: 230: 384: 392: 178: 170: 711: 377: 267: 210: 182: 152: 144: 17: 63:. Contentious material about living persons that is unsourced or poorly sourced 35: 286:
investigation in 2010. As part of that investigation, federal agents purchased
433: 388: 373: 290:
software from the CRACK99 website, as well as other advanced software used in
624:
Sentencing Transcript at 46, United States v. Xiang Li, 10-112-LPS pp. 57, 60
425: 242: 226: 498:"Crack 99 admin gets 12 years in jail for $ 100 million of software piracy" 249:, precision tooling, oil field management, and manufacturing plant design. 365: 334: 323: 214: 194: 383:
In June 2013, the court held a sentencing hearing. Li contended that
319: 315: 213:
authorities in 2011. During that time, he sold over $ 100 million in
174: 428:
technology. Best used the cracked software to design components for
368:
accepted Li's guilty plea to one count each of conspiracy to commit
396:
fact that many of the software products had military applications.
266:, designed by Analytical Graphics Incorporated (AGI) to enable the 421: 311: 307: 198: 448: 364:
and August 2010. In January 2013, the federal district court in
401: 29: 391:
is prevalent in China, but contended that the prevalence of
274:
in December 2009. A team of prosecutors and agents from the
341:, and a high resolution, 3-dimensional imaging program. 217:, the access controls of which had been circumvented by 687:"U.S. Attorney's Office - U.S. Department of Justice" 27:
Chinese cyber pirate imprisoned in the United States
272:
U.S. Department of Homeland Security Investigations
582: 580: 351:Shortly thereafter, Li was arrested, waived his 8: 376:, exposing him to a maximum of 25 years of 177:. He is serving a twelve-year sentence in 131:Learn how and when to remove this message 460: 466: 464: 280:Defense Criminal Investigative Service 526: 524: 522: 520: 518: 348:me? …. Will be able to locate me?" 7: 588:"GOVERNMENT'S SENTENCING MEMORANDUM" 326:of proprietary data hacked from a 25: 253:Operation, arrest and prosecution 221:. The software had civilian and 34: 370:criminal copyright infringement 355:, and confessed to his crimes. 738:21st-century Chinese criminals 440:'s helicopter) and the Army's 166: 1: 322:. Li provided agents with 20 302:Lurement and arrest in Saipan 61:secondary or tertiary sources 278:, Homeland Security and the 155:when mentioning individuals. 67:, especially if potentially 45:biography of a living person 733:Hacking (computer security) 339:International Space Station 65:must be removed immediately 759: 296:programmable logic devices 239:electromagnetic simulation 142: 372:and conspiracy to commit 215:industrial-grade software 151:. This article uses 143:The native form of this 595:Content.govdelivery.com 743:Chinese male criminals 353:right to remain silent 235:communications systems 80:"Xiang Li" hacker 59:Please help by adding 276:Department of Justice 247:intelligence analysis 223:military applications 442:Blackhawk helicopter 728:People from Chengdu 418:radio communication 231:aviation simulation 48:relies too much on 18:Xiang Li (criminal) 536:Books.wwnorton.com 412:American customers 328:defense contractor 153:Western name order 292:spacecraft design 219:software cracking 141: 140: 133: 115: 16:(Redirected from 750: 702: 701: 699: 697: 683: 677: 676: 674: 672: 657: 651: 650: 648: 646: 631: 625: 622: 616: 612: 606: 605: 603: 601: 592: 584: 575: 574: 572: 570: 561: 553: 547: 546: 544: 542: 528: 513: 512: 510: 509: 494: 488: 487: 485: 483: 468: 430:Patriot missiles 264:Systems Tool Kit 168: 136: 129: 125: 122: 116: 114: 73: 38: 30: 21: 758: 757: 753: 752: 751: 749: 748: 747: 708: 707: 706: 705: 695: 693: 685: 684: 680: 670: 668: 659: 658: 654: 644: 642: 633: 632: 628: 623: 619: 613: 609: 599: 597: 590: 586: 585: 578: 568: 566: 559: 555: 554: 550: 540: 538: 530: 529: 516: 507: 505: 496: 495: 491: 481: 479: 470: 469: 462: 457: 414: 385:software piracy 361: 304: 260: 255: 207: 193:Li was born in 191: 156: 137: 126: 120: 117: 74: 72: 58: 54:primary sources 39: 28: 23: 22: 15: 12: 11: 5: 756: 754: 746: 745: 740: 735: 730: 725: 720: 710: 709: 704: 703: 678: 667:. 14 July 2015 652: 641:. 14 July 2015 626: 617: 607: 576: 548: 514: 489: 459: 458: 456: 453: 432:and radar for 413: 410: 393:Chinese piracy 360: 357: 303: 300: 259: 256: 254: 251: 206: 203: 190: 187: 179:federal prison 139: 138: 42: 40: 33: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 755: 744: 741: 739: 736: 734: 731: 729: 726: 724: 723:Living people 721: 719: 716: 715: 713: 692: 688: 682: 679: 666: 662: 656: 653: 640: 636: 630: 627: 621: 618: 615: 611: 608: 596: 589: 583: 581: 577: 565: 558: 552: 549: 537: 533: 527: 525: 523: 521: 519: 515: 503: 499: 493: 490: 477: 473: 467: 465: 461: 454: 452: 450: 445: 443: 439: 435: 431: 427: 423: 419: 411: 409: 407: 403: 397: 394: 390: 386: 381: 379: 378:incarceration 375: 371: 367: 358: 356: 354: 349: 345: 342: 340: 336: 331: 329: 325: 321: 317: 313: 309: 301: 299: 297: 293: 289: 285: 282:initiated an 281: 277: 273: 269: 268:U.S. military 265: 258:Investigation 257: 252: 250: 248: 244: 240: 236: 232: 228: 224: 220: 216: 212: 204: 202: 200: 196: 188: 186: 184: 183:United States 180: 176: 172: 164: 160: 154: 150: 146: 145:personal name 135: 132: 124: 113: 110: 106: 103: 99: 96: 92: 89: 85: 82: â€“  81: 77: 76:Find sources: 70: 66: 62: 56: 55: 51: 46: 41: 37: 32: 31: 19: 694:. Retrieved 690: 681: 669:. Retrieved 664: 655: 643:. Retrieved 638: 629: 620: 610: 598:. Retrieved 594: 567:. Retrieved 563: 551: 539:. Retrieved 535: 506:. Retrieved 504:. 2013-06-12 501: 492: 480:. Retrieved 478:. 2015-07-14 475: 446: 415: 406:Declassified 398: 382: 362: 350: 346: 343: 332: 305: 261: 245:simulation, 233:and design, 225:, including 208: 192: 158: 157: 148: 127: 121:January 2019 118: 108: 101: 94: 87: 75: 64: 47: 718:1977 births 691:Justice.gov 665:Justice.gov 639:Justice.gov 476:Justice.gov 389:cyber theft 71:or harmful. 712:Categories 696:8 December 671:8 December 645:8 December 600:8 December 569:8 December 541:8 December 508:2019-06-23 482:8 December 455:References 451:engineer. 434:Marine One 374:wire fraud 359:Conviction 333:"It's the 284:undercover 243:explosives 201:in 1979. 189:Early life 91:newspapers 50:references 532:"CRACK99" 438:President 426:microwave 324:gigabytes 227:aerospace 173:computer 502:Geek.com 366:Delaware 335:database 237:design, 159:Xiang Li 149:Li Xiang 69:libelous 564:Ice.gov 404:series 195:Chengdu 181:in the 171:Chinese 169:) is a 163:Chinese 105:scholar 424:, and 320:Saipan 316:Saipan 205:Career 175:hacker 165:: 107:  100:  93:  86:  78:  591:(PDF) 560:(PDF) 436:(the 422:radar 312:Skype 308:email 199:China 112:JSTOR 98:books 43:This 698:2018 673:2018 647:2018 602:2018 571:2018 543:2018 484:2018 449:NASA 310:and 294:and 229:and 211:U.S. 84:news 402:CNN 330:. 288:STK 147:is 52:to 714:: 689:. 663:. 637:. 593:. 579:^ 562:. 534:. 517:^ 500:. 474:. 463:^ 444:. 420:, 408:. 380:. 298:. 241:, 197:, 185:. 167:李翔 700:. 675:. 649:. 604:. 573:. 545:. 511:. 486:. 161:( 134:) 128:( 123:) 119:( 109:· 102:· 95:· 88:· 57:. 20:)

Index

Xiang Li (criminal)

biography of a living person
references
primary sources
secondary or tertiary sources
libelous
"Xiang Li" hacker
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
personal name
Western name order
Chinese
Chinese
hacker
federal prison
United States
Chengdu
China
U.S.
industrial-grade software
software cracking
military applications
aerospace
aviation simulation
communications systems

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑