Case Study: Us Indictments Against Chinese Hackers
1. United States v. Wang Dong (2014)
Facts:
Wang Dong, a Chinese national allegedly working for the People’s Liberation Army (PLA), was charged in the U.S. for hacking into U.S. companies, stealing sensitive trade secrets in the steel and solar industries.
He and others allegedly infiltrated computers to benefit Chinese companies economically.
Legal Reasoning:
Charges included economic espionage (18 U.S.C. §1831) and computer intrusion (18 U.S.C. §1030).
The indictment argued that Wang and his co-conspirators intentionally targeted specific U.S. companies to acquire proprietary technology.
The court considered extraterritorial application of U.S. law because the computers and servers affected were located in the U.S.
Outcome/Significance:
Wang remained in China and was not extradited.
This case established U.S. intent to pursue PLA-backed cyber espionage using domestic statutes, even when defendants are abroad.
It marked a precedent for indicting state-affiliated hackers without needing physical custody.
2. United States v. Chen Ping (2014)
Facts:
Chen Ping, a Chinese citizen, was accused of participating in the same hacking group as Wang Dong.
Allegedly responsible for stealing trade secrets from U.S. companies involved in steel production and solar energy.
Legal Reasoning:
Indicted on conspiracy, economic espionage, and computer hacking charges.
Prosecutors argued that Chen knowingly participated in an enterprise backed by PLA directives.
Focused on the pattern of targeted attacks and coordination with other defendants.
Outcome/Significance:
Chen remained outside U.S. jurisdiction.
Highlighted the coordinated nature of state-sponsored hacking and showed U.S. willingness to publicly identify perpetrators.
Reinforced legal basis for extradition-ready indictments, even if unlikely to result in arrest.
3. United States v. Su Bin (2014)
Facts:
Su Bin, a Chinese national residing in Canada, was charged with hacking into U.S. defense contractors to steal military aircraft technology.
Targets included companies involved in fighter jet and drone design.
Legal Reasoning:
Indicted under economic espionage statutes (18 U.S.C. §1831) and computer fraud statutes (18 U.S.C. §1030).
Evidence included IP logs, emails, and coordination with other PLA-affiliated hackers.
Canadian authorities arrested Su Bin following U.S. extradition request.
Outcome/Significance:
Su Bin pled guilty and was sentenced to prison in the U.S.
First successful extradition and conviction of a PLA-linked hacker.
Demonstrated U.S. ability to enforce cybercrime laws globally when physical custody is achievable.
4. United States v. PLA Unit 61398 Members (2014)
Facts:
This was a landmark indictment against five members of PLA Unit 61398, a cyber espionage division in Shanghai.
Charged with hacking U.S. corporations to steal trade secrets across multiple sectors, including aviation, energy, and communications.
Legal Reasoning:
U.S. Department of Justice used statutes including economic espionage, wire fraud, and computer fraud.
The indictment included detailed evidence of phishing attacks, malware deployment, and data exfiltration.
Highlighted state-sponsored espionage as a criminal enterprise under U.S. law.
Outcome/Significance:
None of the accused were extradited; they remain in China.
Case was symbolic, used to raise public awareness and justify sanctions against China.
Established U.S. strategy of naming and shaming state-backed hackers to deter future attacks.
5. United States v. Huaying Haitao (2021)
Facts:
Huaying Haitao, a Chinese national, charged with conducting cyber intrusions targeting COVID-19 research and vaccine development companies in the U.S. and abroad.
Legal Reasoning:
Indicted for economic espionage, computer intrusion, and theft of trade secrets.
Prosecutors argued the attacks were intended to benefit Chinese companies and government initiatives.
Evidence included network logs, intercepted communications, and malware traces.
Outcome/Significance:
Huaying remained outside U.S. jurisdiction.
Case highlighted the strategic shift in Chinese hacking targets toward biotech and public health sectors.
U.S. emphasized both economic and national security aspects of cybercrime.
6. United States v. Jiang Lizhi (2020)
Facts:
Jiang Lizhi, allegedly affiliated with Chinese state interests, charged with hacking U.S. defense contractors and stealing sensitive data related to missile and radar systems.
Legal Reasoning:
Indicted for economic espionage, conspiracy, and computer fraud.
Prosecutors relied on forensic evidence linking IP addresses to Jiang and his co-conspirators.
Focused on dual-use technology theft, highlighting national security risks.
Outcome/Significance:
Case remains open; Jiang not extradited.
Illustrates U.S. approach to prosecuting high-tech and defense-sector cyber espionage, relying heavily on indictments even when defendants are overseas.
7. United States v. Zhu Hua (2019)
Facts:
Zhu Hua allegedly led hacking operations targeting U.S. and European solar energy companies to benefit Chinese competitors.
Legal Reasoning:
Charged under economic espionage and computer fraud statutes.
Detailed evidence of spear-phishing campaigns and malware distribution included.
Prosecutors emphasized cross-border coordination between state actors and private entities.
Outcome/Significance:
Zhu Hua remains outside U.S. custody.
Case reinforced the pattern of targeting “green technology” sectors as a priority for Chinese hackers.
Key Patterns from These Cases
| Case | Target | Alleged Affiliation | Outcome | Legal Significance |
|---|---|---|---|---|
| Wang Dong | Steel, solar | PLA | Not extradited | Extraterritorial application of U.S. law |
| Chen Ping | Steel, solar | PLA | Not extradited | Coordinated state-backed hacking |
| Su Bin | Military tech | PLA | Extradited, pled guilty | First successful PLA-linked conviction |
| PLA Unit 61398 | Multiple industries | PLA Unit 61398 | Not extradited | Public naming & shaming strategy |
| Huaying Haitao | COVID-19 research | Unknown state links | Not extradited | Biotech sector targeted |
| Jiang Lizhi | Defense tech | PLA-affiliated | Open | National security focus |
| Zhu Hua | Solar/green energy | State/private | Not extradited | Cross-border industrial espionage |
✅ Summary:
U.S. indictments against Chinese hackers rely heavily on economic espionage and computer fraud statutes.
Most defendants are outside U.S. jurisdiction, leading to symbolic indictments aimed at deterrence.
Some successful extraditions (e.g., Su Bin) show that prosecution is possible when cooperation with other countries exists.
Patterns indicate state-backed targeting of strategic industries, including defense, energy, and biotech.

comments