tv Declassified CNN September 2, 2017 6:00pm-7:00pm PDT
6:00 pm
we are living in a cyber age, and it's the new theater of operations for the military and really for all of us. the future is now. i mean, what's happened is over the course of time hardware has given over to software, military functions are being performed by software that used to be performed by people. if an adversary wanted to harm the u.s., the use of stolen u.s. software could be helpful in doing that. many of us don't fully understand how digital our age really has become. for example, digital methods are used to control all kinds of
6:01 pm
things, everything from bridges. it can mean ports, it can mean dams. it can mean the power grid. there are a lot of americans that don't fully understand how serious a threat we're fighting. >> as a former fbi agent and chairman of the house intelligence committee, i had oversight of all 16 of our nation's intelligence agencies. my name is mike rogers. i had access to classified information gathered by our operatives. people who risked everything for the united states and our families. you don't know their faces or their names. you don't know the real stories from the people who lived the fear and the pressure until now.
6:02 pm
so in december of 2009 i had joined the in philadelphia. it sounds very technical, but all it is is just troo toy troo prevent u.s. technology from getting into the wrong hands. >> illegal acquisitions of u.s. goods and technology can assist our adversaries in harming u.s. soldiers. citizens and allies. >> basically what we do is we go out to companies all around the country so that they know who we are and can call us if they see any wrongdoing. so my first outreach was to a company called agi. they produce complex three-dimensional simulation software called stk, satellite tool kit. that wasn't my world. i mean, i was coming from investigating narcotics trafficel. what really opened my eyes to the importance of this technology was a simulation that they ran for me of a ballistic missile launch from north korea
6:03 pm
to hawaii. and in this simulation it looked at u.s. satellites, literally where they were in outer space to figure out how can they do this launch at just the right time when our satellites aren't watching to get that missile up and over so it could strike wide before we're ready to defend ourselves. and that kind of opened my eyes to the importance of this software and why it shouldn't be in the wrong hands. i came to the end of my presentation and almost as an after thought the control officer came to me and showed me crack 99. he showed me agi's stk software advertised for a,000 on a chinese website where it didn't belong. he said i'm not sure this they actually have it because in order to sell our product they would need the electronic license files, almost like an electric key that accompanied this product or the program wouldn't work. so he wasn't sure whether they actually had it or want.
6:04 pm
i had to find out. i spoke with my supervisor mike about my visit to agi and the discovery of crack 99. the two things we decided on was that, one, we were going to initiate an undercover operation and, two, we're going to need to call dave hall. dave had a prooub track record. i knew that dave understood the complexities of these times of investigations and based on the fact that it was sensitive technology. one of the concerns we had at the beginning of the investigation was weather this person was working for the chinese government. generally speaking they are considered to be an adversary of the united states and this software had direct military application and it gives us an advantage strategically in dealing with adversaries. >> figuring out who was behind it was a little bit like finding a needle in a haystack, operating in an nipplety on the internet makes it a lot easier to commit these crimes. >> agi had done a little bit of
6:05 pm
their own research. where is it hosted? and sure enough it was hosted in china under the name jang lee. i want to know what are we looking at? how big is this i wanted to make an undercover purchase. >> crack 99 offered a very unique insertion point for an undercover operation because it was a website that was open to the public. i called a colleague of mine from the defense criminal investigative service, dci s, who works as an undercover agent and could take on the undercover person that for this case. i knew that's where this was going to go. >> they work together to stop the trafficking of critical dod weapons systems and technology. we don't want bad guys getting our stuff. that would provide our enemies with an advantage having the same women's we have. we don't want to have a level playing field. we want to have the upper hand. our mission is to protect the war fighter and in the end they
6:06 pm
protect us. when i first saw the website, it was like a bad 80s television commercial. it really was sloppy. it was like an amazon or ebay of pirating software, but this is technology that isn't off the shelf. it's not available to even u.s. citizens. it was pretty clear this was a threat to national security. >> our first step was to send an e-mail. we asked to purchase satellite tool kit for a,000. the retail value of that software was more like $150,000. >> he wrote us back and in the e-mail he laid out payment instructions. send payment via western union. myself and the agent, we drove to the first western union we could find in the state of delaware and we sent a,000 to china. >> not knowing the background of whose running the website, i wasn't confident that we were going to get what we paid for. >> maybe it's a scam. maybe we're about to get ripped
6:07 pm
off. we don't know at this point. essentially we're collecting evidence. that's why we have to make the purchase and then see what happens from there. we open up our undercover laptop computer, and we just waited. and later on that day he sent us the download links. and he gave us instructions in broken english on how to unpack the files and download the software. we brought the evidence over to agi. and the head of it unpacked these files. he was floored by what he saw. we had every single one of their programs. all operational. >> this technology gives us an advantage on the battlefield and on the threat posed by an operation like this is that he could sell it to anyone who is willing to pay for it. it can go to adversaries of the united states, it can go to troechlt organizations, it can go to criminal organizations.
6:08 pm
this software, finding its way into the wrong hands is equally as dangerous as any weapon. >> the reaction was we realize the that the software was legitimate was what else do they have? experience unparalleled luxury at the lexus golden opportunity sales event before it ends. choose from the is turbo, es 350 or nx turbo for $299 a month for 36 months if you lease now. experience amazing at your lexus dealer. (vo) it would be great if human beings were great at being human. and if all of mankind were made up of kind women and kind men. it would be wonderful if common knowledge was knowledge commonly known.
6:09 pm
and if the light from being enlightened into every heart was shown. it would be glorious if neighbors were neighborly. and 'indifference' a forgotten word. it would be awesome if we shared everything and being greedy was absurd. it would be spectacular if the golden rule was golden to every man. and the good things that we ever did was everything that we can. (vo 2) treating others like we'd like to be treated has always been our guiding principle. ♪ ♪ ♪ ♪ wow! nice outfit. when i grow up, i'm going to mars. we're working on that. some people know how far they want to go.
6:10 pm
a personalized financial strategy can help you get them there. see how access to j.p. morgan investment expertise can help you. chase. make more of what's yours. to j.p. morgan investment expertise can help you. stir up a rich creamy flavor. it can inspire you to stir up other things, too. like a new friendship. stir up commitment... with coffee-mate ice cream flavors.
6:12 pm
crack 99. >> this software had direct military application and the implications are scary because there is no way of restraining the sales. it can go to terrorist organizations, it can go to criminal organizations. >> the reaction once we realized that the software was legitimate was what else do they have? >> ultimately our goal in the undercover investigation was to successfully prosecute in a u.s. court of law. we knew we were dealing with a person who was holding himself out as xiang lee, but in addition to not knowing if that was a real person, we didn't know if that was the only person involved. we had a large number of questions about the operation. >> we needed to figure out a way of getting a viable target. so in january in 2010 i requested authorization to go trap and trace on xiang li's e-mail account. so i can get an understanding of how big his customer base is and
6:13 pm
how big his operation is. >> e-mail is an extremely rich source of evidence for law enforcement, but that doesn't mean you can just read somebody's e-mail in a law enforcement investigation because you're interested. you still have to develop probable cause and obtain a warrant from a federal judge in order to gain access to their e-mail. >> so dave said let's do a few more purchases and let's verify that this wasn't a fluke. >> me and my -- we went through another website. we sent a western payment to xiang li for these two programs. same thing. sent us download links later that day. li was highly responsive. he was extremely attentive to customer relations. he would do whatever we needed him to do as long as we first paid him the money. >> that's the thing we noticed about him is that he was all about the money. >> so we downloaded the programs on to our laptop. we knew out to san jose, met with the km. they looked at it and they
6:14 pm
figured out that this was a worki working copy of their program. again, he had cracked the license file to make it work. this software tested the structural integrity of airplanes, of spacecraft, crack 99 was selling it as if it was a microsoft office suite. >> i was becoming increasingly concerned about the implications of the crack 99 operation. the biggest question for all of us was where did this come from? how did he get it? >> we didn't know if crack 99 was a large number of people hacking into u.s. servers. we didn't know if he had in-house crackers, meepg people who crack the licensing file to enable access to the software. >> i had no idea who i was communicating with, the originator or if it was one of hundreds of sales reps. >> it's an overseas target who is particularly difficult to identify because he's operating on the internet and is
6:15 pm
anonymous. >> so on the crack 99 website there's an he felt mail address to contact them at g mail.com. >> you might ask why he was using g mail and therefore accessible by u.s. law enforcement. and the answer is he wanted to use a readily available e-mail that everybody was familiar with as opposed to a chinese e-mail server. >> once we had completed our third purchase, we applied for a search warrant. the judge signed off on the search warrant, and we submitted our search warrant to google. >> it bog else my mind that he has a g. mail address. >> we're lucky he did. >> what it gave me was all the incoming and outgoing e-mails from that account and when we got the results, we realized that we had about 12,000 e-mails. >> and that's when we understood the full scale of his operation. we could see he was selling to customers all over the world. >> i saw a government customers
6:16 pm
from places like uganda, uae, saudi arabia. i also saw some customers in there from places like syria. one particular case it was for a government contract in syria. iran. he had plenty of people reach out to him from iran. >> we knew that we did, in fact, have a problem, and we really needed to pick up the pace in this investigation. >> if we don't stop crack 99, the potential consequences are troops being hurt, terrorist attacks. there's a reason this technology is restricted, and that's to avoid exactly this situation where the technology is being trafficked without any limitations all over the world. >> we know we need to have a plan to meet him face-to-face, to ultimately make an arrest. the problem is that he's in china, we're in the united states. s'cuse me. mind if i sit here? not if you want your phone to work.
6:17 pm
let me guess, can't livestream your lobster roll. and my mobile pay isn't connecting and i just got an unlimited plan. right plan, wrong network. you see, verizon has america's largest, most reliable 4g lte network and now unlimited plans start at $40 per line, you know what i'm saying? oh, this is your seat. definitely. yep. just tucking it in. i wasn't gonna pull it out. introducing unlimited for all. all the data you want on the network you want. now starting at $40 per line for four lines.
6:18 pm
it's time for the biggest sale of the year with the new sleep number 360 smart bed. it senses your every move and automatically adjusts on both sides to keep you effortlessly comfortable. and snoring.... does your bed do that? the new 360 smart bed is part of our biggest sale of the year where all beds are on sale. and right now save 50% on the labor day limited edition bed, plus 36 month financing. ends monday!
6:20 pm
as i was reviewing the e-mails, i saw that his customers were from over 60 different countries. he had e-gift pales from places like syria and iran. he doesn't care who his customers were. he just knew that they wanted a product and he had it for them, and he had to figure out how to get it to them. ultimately we found well over 500 transactions.
6:21 pm
it's scary to think that stuff is in the wrong hands. >> by mid 200010 we had looked through the e-mails, and at that point we determined what the scope of the crack 99 operation was. crack 99 was xiang li. it was one person operating this website and really if you think about what the crack 99 website was, it was an inventory of high level advanced software that had been stolen from the united states. xiang li never asked us why we wanted the software, who we were, how we were going to use it. he had no concern for the potential harm and the consequences. his technology trafficking operation could cause. >> so now we could get a federal arrest warrant for this guy, but it's not going to amount to much to somebody in china is who is want going to leave.
6:22 pm
it helped to go through all of his e-mails because i could figure out a little bit more about xiang li and i'm seeing how he communicates with his customers. how he follows up. i mean, he really was dedicated to all of his customers to making sure that they got the product that they paid for. and so i knew that he was eager to please his customers. i wanted to use that to get him to travel to where we could arrest this guy. >> we understood what his motivation was, and his motivation was money. in my experience, greed is almost always what gets people caught. we're not talking about crimes of passion here, you know. this is business. and then violating the law to make money. so the plan was that we would put a carrot on the stick in the form of more money. >> so i was going to explain to him that i was a business broker for an aerospace software products in the united states and that i had a customer base already that would be willing to pay considerably more than what
6:23 pm
he was selling his products for on crack 99 and that together we could make a lot of money. >> we told xiang li that we thought his prices in many cases were too low. we told him we could help him increase his revenue. so at this stage we thought the communications needed to go beyond e-mail to skype calls. and i know that he said in his e-mails he doesn't speak dplish. >> and that's when we elicited the assistance of a translator to have telephone kfrgsz. >> the point of these skype calls, in addition to proposing this business idea, was just to develop a rapport and a relationship and trust. >> good morning, how are you? we're very excited about the software we got so far. it's been truly worth our while. >> the undercover was very disarming, very friendly. he was very natural person.
6:24 pm
that's what we needed for this part of the operation. >> i want to explain an idea that we have here. we've found a market for software. small businesses are willing to pay a lot of money for u.s. software. we can give him 50% for his support. that will be the partnership. >> at first he was a little guarded because he wasn't sure why i didn't just purchase the software from him and sell it to my customers without his knowledge. my story was i needed to have somebody that could troubleshoot. i'm not a computer guy. we're interested in acquiring his support for the support that we purchase. that's what we would need from him. if they had questions, i wouldn't be able to answer them. that's why i needed him. i put a value to his
6:25 pm
participation. >> he said he need to protect his identity. >> okay. i understand that. >> he's not going to talk directly to our customer about price. >> no, no, never. >> so you be the one that talk price. >> our customers will never know his identity. they will only be dealing with us. >> he says okay. >> he was very interested in that because what all that meant was that he could make a lot more money in the u.s. market. >> during our first call we introduced the idea of us meeting in person. >> tell him very excited about that. has he ever -- has he traveled in the u.s.? i would love to meet and invite him to our business. >> he said he can come u.s. >> it didn't go very far. we have a little laugh about it and we kind of just moved on. i knew it would be difficult to
6:26 pm
get him to travel, so i wanted to tread lightly. and then he introduced something new to us. he came back and said that he has another big surprise for us. >> he has something that's very difficult to get. >> what? what exactly? >> it's a database. it's about 20 gig abites. >> now it wasn't just a hacked software program. now it sounded like he had 20 gig abites of internal data from a company. >> it was software technology that had been stolen from a defense contractor and other information that was not public information. >> what does that mean? >> i can't tell you exactly what that was, but it was a threat to u.s. national security. >> did it echk late the urgency? >> it did. now they're hacking into u.s. companies and extracting the data. he gave us the price of 3 thouds. we sent payment to him and it
6:27 pm
didn't come. >> and this caused us to wonder whether he was suspicious. in the past he was highly responsive and he was highly attentive to customer relations. >> we sent xiang li an e-mail and finally he wrote back. he said that the data is too large to transfer at this time via download. he said that he could mail the disk to us. he didn't do that either. >> the purchase of the proprietary data also gave us another reason to meet with him face-to-face and that was to transfer it on disk as opposed to by download. so what we had to do was figure out another place other than the u.s. or china to meet. the issue really was where xiang li was willing to go. >> and so we talked to him about us having this business trip coming up in the spring. >> i'm going to be doing a trip to march in asia, but that's not confirmed yet. >> i pitched to him the idea of a business trip so we could
6:28 pm
discuss his business in the u.s. would he meet me to shake hands on our business partnership? >> he wasn't very interested. he was in a win win situation. he could just communicate with his client base through e-mail. so he didn't need to meet. >> we became impatient at that point. we had done a couple other purchases at this time, but we were losing a little bit of hope. and we didn't hear anything for a couple of days. and i remember on a -- it was on a sunday i logged in and checked the account to see if he had responded, and i saw that he wrote me in this broken english that he agrees to the traveler is how he wrote it. he was going to meet us. what's the value of capital? what's critical thinking like?
6:29 pm
a basketball costs $14. what's team spirit worth? (cheers) what's it worth to talk to your mom? what's the value of a walk in the woods? the value of capital is to create, not just wealth, but things that matter. morgan stanley stir up a rich creamy flavor. it can inspire you to stir up other things, too. like a new friendship. stir up commitment... with coffee-mate ice cream flavors. hi. lookthe whole fam. hooked you should switch to sprint like i did. with sprint, you are not paying a ton for unlimited or overages. don't get hooked by verizon and let a 1% difference in network reliability cost you twice as much. switch to sprint unlimited $22.50 per month per line for four lines. for people with hearing loss, visit sprintrelay.com karl, have you met everyone?
6:30 pm
you see, time is just a construct of human perception, an illusion, like this one. help, i can't breathe! which means there's no pressure to get a great rate on a hotel. they're available for an unlimited time, always. so, book now. or don't. no pressure. patrick woke up with a sore back. but he's got work to do. so he took aleve this morning. if he'd taken tylenol, he'd be stopping for more pills right now. only aleve has the strength to stop tough pain for up to 12 hours with just one pill. tylenol can't do that. aleve. all day strong. all day long.
6:32 pm
xiang li reached out to us and said he would be willing to meet us on the island of saipan. >> he came up with saipan. we were all very excited. that was on a sunday. i remember calling mike. he couldn't believe it and i couldn't believe it. from xiang li's perspective it was a great destination because it did not vier a visa for him to travel there.
6:33 pm
>> i was extremely happy. saipan is a territory of the united states and we would not have to get any special permission to conduct an undercover investigation and furthermore we would not have to worry about extradition to remove the defendant back to the mainland of the united states. >> i'm looking forward to meet and discuss some future business. >> our team from philadelphia moved to saipan and we worked to put together our undercover operation. that included wiring a hotel room where we intended to have the meeting. we conducted an investigation that lasted a year and a half, and our ultimate goal was to present all this evidence to a jury in the united states. and put him in jail. putting this kind of undercover meeting together is complicated because there are a lot of moving pieces. if something goes wrong, anything could happen, right up to somebody being killed. there's a lot at stake. >> the flights from clean
6:34 pm
arrived early in the morning on june 6th, 2011 and i was there in the airport. i was nervous that he wasn't going to show. i'm thinking how disappointing will this be if we do all this and to have come more than halfway around the world to this little island and he never shows. >> so the case agent was inside the airport. made a positive identification of xiang li, but he also had his mother-in-law and his five-year-old son with him. he never let us know that his child and his mother-in-law would be coming. we were definitely surprised. i don't think it's smart to bring your family members to a criminal ran day view and i don't recommend it. >> you're dealing with human nature, so it's unlimbed the amount of surprises. >> they went aboard the bus to the hotel and at that point we thought it likely that he would go to sleep. it was early in the morning. he had been on an airplane all night. that's not what happened. we had xiang li's hotel under
6:35 pm
surveillance and he came out and he jumped into a suzuki samurai and took off. >> we didn't know where he was going. we followed him all around the island. and this was very concerning because we didn't know if he was meeting with somebody. >> you go into this, you don't know if he brought other people with him if he was going to be doing surveillance on us. there was always concern that xiang li could have been part of a larger operation and could have been backed by the chinese government. >> from what we knew of him, we thought he was a chinese businessman, but we didn't know. you can never assume that somebody is not dangerous. >> i had a concern as to whether he might obtain a firearm. there's one thing i've learned in a long career is you never know who is capable of violence and who is not s. we did have a plan in place for dealing with a contingency like that and the agents were able to follow that car into the hills up until a point until our path was cut off and we decided to stop the
6:36 pm
surveillance. >> and then we just waited. they broke off that surveillance, and one of the questions we had was whether he was suspicious. in particular we wondered if maybe he had made our surveillance of him being watched at the airport. we just didn't know. >> we went back to the hotel and later on that night he let us know that he had arrived. he was there and he wanted to meet the next morning at 9:00 a.m. >> so we made arrangements with him that he would come and meet us at our hotel the next day. >> so we really didn't know anything about xiang li as a pepper and so it was time to find out. >> i do enjoy being an undercover agent. i really enjoy meeting the subject face-to-face, engaging with the subject, and having him explain the criminal activity in his own words. i'm not worried about arresting him. that's what the cover team is for. i'm not worried about prosecuting him.
6:37 pm
that's what dave hall is for. i'm just there to get what i paid for and talk business. >> so the next day he comes and we're getting prepared, ensuring that we have our audio and video in place. and just a few minutes before we're supposed to meet, xiang li called our dcs under cover agent and asked him if he could pick him up. >> so now i actually have to get wired myself instead of just the room. my worst case scenario would be for him to say something and explain something that was critical to our investigation and not have it recorded. >> and it's actually a big operation. then all of a sudden we have to conduct on the fly. we need to have surveillance agents following them for the safety of the agent. >> i was wired up. i brought the translator with me. we drive maybe about a mile down the road to the hotel that he was staying at. as i pull up, i see xiang li,
6:38 pm
but what i didn't expect was his mother-in-law and his five-year-old son, who was wearing a bathing suit and water wings. this is something i didn't expect. i was absolutely floored. >> we certainly don't want to have any sort of meeting where anyone else is present except for him. we have to ensure that we are only going to talk to him and that's it. >> after i introduced myself and we exchanged held lows, i asked why is your son here? he said he wanted to bring his son to my hotel because we had a better pool. he had looked at my hotel online when doing his research. he said while we discuss business in your hotel room, my son will swim and then we can all have lunch after our business meeting. so i told him that although our hotel was quite nice, it had a lot of security and that i had already witness them deny
6:39 pm
nonguests the right to swim on property. he agreed and we drove back together in my car. you know, it could be that his son was not going to be seeing his father after this, but at the end of the day, xiang li put himself in that situation. we were driving back to the hotel and when i left our tech agent was finishing up the placement of the various recording devices. >> at the time that the undercover left to go pick up xiang li, the tech agent stopped all the recording devices in the hotel room. and the reason he did this is that they're all battery powered. so he shut everything down and he was in the hotel room waiting for xiang li and the undercover to return. >> so what i like to do is when i'm on my way back is just point out different points of interest
6:40 pm
to give them an idea how far away i am, because they can hear me. i have an open transmitter. so on the way back i am pointing out that this is my hotel here on the left. as we pull in, i make note of the different shops in the lobby as we approach our elevator so that i can, you know, give time for the tech agent to finish up and that everybody can be in place. so myself, the translator and xiang li, we enter my hotel room. as the meeting was progressing, i got to a point where i actually took out my telephone and i looked at my e-mail, and i saw an e-mail from the tech agent. his e-mail stated don't shit
6:41 pm
yourself, i'm in the bathroom. this golden opportunity features leather wood and glass. raw elements made premium... by lexus. experience unparalleled luxury at the lexus golden opportunity sales event before it ends. choose from the is turbo, es 350 or nx turbo for $299 a month for 36 months if you lease now. experience amazing at your lexus dealer. (vo) it would be great if human beings were great at being human. and if all of mankind were made up of kind women and kind men.
6:42 pm
it would be wonderful if common knowledge was knowledge commonly known. and if the light from being enlightened into every heart was shown. it would be glorious if neighbors were neighborly. and 'indifference' a forgotten word. it would be awesome if we shared everything and being greedy was absurd. it would be spectacular if the golden rule was golden to every man. and the good things that we ever did was everything that we can. (vo 2) treating others like we'd like to be treated has always been our guiding principle.
6:45 pm
when i went in with xiang li and the translator, the tech agent was still in our hotel room. he was turning on the batteries for the recording devices. the individuals that had the radio went back across the hall to get in place and he didn't realize until we came to actually put the key in the door that he then jumped into the bathroom. after i got -- >> he was hiding in the bathroom. >> he was hiding in the bathroom. so i then chuckle. i turn to the translator and i show her the phone so she can read the tech agent's e-mail. i said can you believe my wife still hasn't got down the time zone? she still doesn't know what time it is here? because at any given time xiang li could ask to use the bathroom. >> the uc has the most difficult job at this point because it's not his responsibility top
6:46 pm
ensure that we elicit all of the fact that we need and identify that xiang li was in fact the person that's committed these crimes. we had audio and video rolling. >> we were in another room that was right across the hall, and we were the takedown team. >> there was a second undercover who was an hsi agent who spoke fluent mandarin. from my point of view as the prosecutor, i wanted to make sure that there was no question about what was said during that meeting. >> ask him if he can just explain it -- >> i wanted to make sure that if this matter went to trial, that xiang li would never be able to say, well, english is not my native language. i didn't understand what the undercover was saying and therefore, i really didn't have
6:47 pm
any criminal intent. >> at first he was still a little guarded and then i think he realized that everything that had been put in place is actually coming true. >> and that's when he started presenting all the stuff that we had purchased that we never received. >> we paid for this a month ago. >> just like i do on any of my undercover meets i actually have a list of objectives i need to meet. first i need to establish identity. i need to know that who i'm meeting with is the person that i'm communicating with. i have to put him behind the key strokes. >> when i e-mailed you through e-mail, that was you and no
6:48 pm
other -- >> yes. >> he came very comfortable with me. he enjoyed showing me how to smug gel the software out of the country. >> everything is separate -- >> so i put the disks in something like this. >> and he explained different methods on hiding and concealing the software, at which point i raised my hands up as if i had handcuffs on and he chuckled and said, no, no, you know, you won't have to worry about that. you won't be arrested. >> because we know that in our country that's illegal, have any companies reached out and contacted him and, you know --
6:49 pm
>> he's saying that there have only been a handful of companies that have contacted him that he has their stuff and then -- >> and once he said that, this told me that he understood that what he was doing was illegal and specifically was illegal under u.s. law. we established that xiang li was the person that we were talking to through e-mail. we established that xiang li knew that what he was doing was in fact illegal in the united states. we established the fact that he had smug he would now this software into saipan. the meet was going well. xiang li was we were getting some good information. and it was time to bring it down and end the undercover meet.
6:50 pm
6:51 pm
with coffee-mate ice cream flavors. it's time for the biggest sale of the year with the new sleep number 360 smart bed. it senses your every move and automatically adjusts on both sides to keep you effortlessly comfortable. and snoring.... does your bed do that? the new 360 smart bed is part of our biggest sale of the year where all beds are on sale. and right now save 50% on the labor day limited edition bed, plus 36 month financing. ends monday!
6:52 pm
we want to stream nfl sunday ticket live, every sunday. even if we can't get directv where we live. cause we want every play. even if we don't live in a house. because a lot of us live in apartments. or on campus. paying attention mr. beasley? what did i just say? something about football? stream live games, every sunday, on your devices. with nfl sunday ticket .tv. hey you've gotta see this. cno.n. alright, see you down there. mmm, fine. okay, what do we got? okay, watch this. do the thing we talked about. what do we say? it's going to be great. watch.
6:53 pm
remember what we were just saying? go irish! see that? yes! i'm gonna just go back to doing what i was doing. find your awesome with the xfinity x1 voice remote. i'm telling you, if he looks over here, he's going to see someone sitting here. >> the meet was going well. xiang lee was talking a lot. and we were getting -- we were getting some good information. we established that xiang lee was the person that we were talking to through e-mail. we established that xiang lee knew that what he was doing was, in fact, illegal in the united states. we established the fact that he had smuggled now this software into saipan. now pretty much all that was left was to make the arrest.
6:54 pm
>> we were still discussing things, but at that point, i wasn't going to go forward with anything else. i got everything that i wanted to get out of him. so we had set up a phrase that i would use with my cover team. that would show that the meeting was done and that it was time to come in and arrest xiang lee. the phrase was "our business is done here in saipan." >> now that our business is done here in saipan -- raise your hands! get down! get down! get down! on the ground. police. police. >> we arrested everybody in the room and separated everybody and this was kind of the moment that i had been preparing for as the case agent, because now i had my questions for xiang lee. read him his rights in chinese and he understood them and signed off and agreed to talk to us. we sat there and we really
6:55 pm
talked about everything. and he was very cooperative with us, at first. >> xiang lee denied being the hacker. he said he obtained the software from hackers that he would meet online. he also denied being the cracker. >> and that's when he explained to me about these fan groups and about hacking groups in these message boards throughout china and russia. all of these programs had been hacked and cracked by other people, and put on numerous online groups, but it would be a site that was disjointed and difficult to navigate. so he would find as many crack software programs as he could find. and he would compile them and post them on his website. and then people could do searches. they could find what they need. and they could get fully functioning copies that they wouldn't be able to find in these chinese language message boards. and at the time, nobody else was doing that. people would say, do you have whatever software program? and he would just keep looking and keep looking.
6:56 pm
it was almost like it was his crusade to get operational cracked software to as many people as he possibly could. >> xiang lee had a real capitalist point of view. he was trying to make money. so, lumbar, we concluded he probably was not working for the chinese government or otherwise an agent of the chinese government. and that he was really a privateer. meaning that he was an internet pirate, who was selling stolen software for his own profit. >> i don't think he knew the retail values of these programs. i think if he did, i think he would have upped his prices a little bit. i don't think he quite understood how much he was giving to people. >> why was he driving around the island? >> net enin the end, we actuall determine what was going on. it was not the case that he had become suspicious of us. he wanted to do some sightseeing. he was trying to squeeze a vacation into a business meeting. in other words, he really was mixing business and pleasure.
6:57 pm
after we arrested xiang lee, we went to the hotel to conduct a search of his hotel room and his mother-in-law and his son were there. and that was inevitably a sad thing. >> it's awful. yeah, no, it's awful. it's an innocent victim. >> but my ultimate conclusion on that was that that was a sad event that was of xiang li's creation and that it was his fault. and i took xiang li's son downstairs to the lobby and i bought him an ice cream cone. >> why did you buy him an ice cream cone? >> well, i bought him an ace cream cone because this was a bad day. and ice cream cones don't make bad days good days, but maybe makes a s it a little better. >> cyber crime is all of our cases now. it expanse the realm of all of our investigations that we do.
6:58 pm
>> the public is not fully aware of how successful some of these attacks have been. this is a staggering, staggering number. $1 trillion in losses, because of cyber attacks. >> during the time period of the xiang li investigation, the federal government was becoming much more aware of and attuned to the cyber threat. >> within an hour, hackers had seized controlled of the unclassified e-mail system used by the pentagon's joint staff. >> iranian hackers infiltrated computer software that controls the floodgates of this ry, new york, dam. >> computer spies have reportedly stolen information about the f-35. >> among the data reportedly stolen, designs for the f-35 and details about the jet's radar systems, as well as flight diagnost diagnostics. >> in 2010, cyber com was established, which is a combat and command at the department of defense, specifically directed to deal with the cyber threat.
6:59 pm
>> whether you're working an export case or child exploitation case or fraud case, everything is done over the web. so whether i want to or not, i have to be able to look into how these people are conducting their activity online. i've got to figure out what servers they're working off, who they're talking to, how they're talking to these people. i've got to figure out how i'm going to identify them and pull them out of the shadows. >> xiang li was charged with a number of conspiracy counts. he was charged with criminal copyright violations. he was charged with wire fraud. he pled guilty to the most serious charges and was sentenced on that basis to 12 years in prison, which was the heaviest sentence ever imposed in a criminal capopyright case.
7:00 pm
it's a time of enormous turmoil. >> shut up in here! >> the '60s are over, dad. >> we intend to cover all the news, all the time. we won't be signing off until the world ends. >> isn't that special? >> any tool for human expression will bring out both the best and the worst in us and television has been there. >> they don't pay me enough to deal with animals like this. >> people are no longer embarrassed to admit they watch television. >> we have seen the news and it is us.
210 Views
Uploaded by TV Archive on
