Mozaffar Khazaee, 61, formerly of Manchester, Connecticut,
was sentenced today to 97 months in prison and ordered to pay a $50,000 fine by
U.S. District Judge Vanessa L. Bryant of the District of Connecticut for
violating the Arms Export Control Act by attempting to send to Iran highly
sensitive, proprietary, trade secret and export controlled material relating to
U.S. military jet engines, which he had stolen from multiple U.S. defense
contractors where he had previously been employed.
Assistant Attorney General for National Security John P.
Carlin, U.S. Attorney Deirdre M. Daly of the District of Connecticut, Special Agent
in Charge Matthew Etre of U.S. Immigration and Customs Enforcement-Homeland
Security Investigations (ICE-HSI) Boston, Assistant Director Randall C. Coleman
of the FBI’s Counterintelligence Division, Special Agent in Charge Craig W.
Rupert of the Defense Criminal Investigative Service (DCIS) Northeast Field
Office, Special Agent in Charge Danielle Angley of the Air Force Office of
Special Investigations and Special Agent in Charge John McKenna of the
Department of Commerce's Office of Export Enforcement Boston Office made the
announcement.
“Mozaffar Khazaee exploited his privileged access to
national security assets to steal highly sensitive military technology with the
intent of providing it to Iran,” said Assistant Attorney General Carlin. “Violations of the Arms Export Control Act,
particularly those involving attempts to transfer sensitive defense technology
to a foreign power, are among the most significant national security threats we
face, and we will continue to leverage the criminal justice system to prevent,
confront, and disrupt them.”
“Mozaffar Khazaee betrayed his defense contractor employers
and the national security interests of the United States by stealing and
attempting to send to Iran voluminous documents containing highly sensitive U.S.
defense technology,” said U.S. Attorney Daly.
“U.S. companies are being relentlessly targeted by those who seek to
steal our intellectual property, our trade secrets and our advanced defense
technology – whether through a computer hack or cyber intrusion, or through an
insider or rogue employee. As this case
demonstrates, we will aggressively investigate and hold accountable those who
attempt to steal trade secrets and military technology from U.S. industries, whether
for their own personal gain or for the benefit of foreign actors.”
“Stopping people like Mozaffar Khazaee from providing U.S.
military technology to foreign powers is crucial to our national security
interests,” said Special Agent in Charge Etre.
“It’s abundantly clear from court records that this individual intended
to harm U.S. interests both here and abroad.
HSI will continue to work with our federal law enforcement partners to
ensure that advanced U.S. military technology is not stolen and illegally
exported for the benefit of foreign entities.”
“Mr. Khazaee abused a position of trust and responsibility
by stealing trade secrets and sensitive information belonging to defense
contractors developing some of our most advanced aircraft,” said Assistant
Director Coleman. “His actions could
have put our national security at risk.
Stopping his plan and holding him accountable for his betrayal was a
whole-of-government effort. We will use
all available legal means to pursue individuals willing to help our adversaries
by stealing our technical know-how.”
“The evidence developed during this investigation and
today’s sentencing of Mr. Khazaee illustrate the potential for harm to the U.S.
through illegal exportation of sensitive documents and technology,” said
Special Agent in Charge Rupert. “DCIS,
along with our partner agencies, continues to prioritize and pursue these
investigations to curtail any adverse impact to America's warfighters and
shield America's investment in national defense.”
“This case was enabled by the outstanding teamwork amongst
the many federal law enforcement agencies and U.S. Attorney’s office,” said
Special Agent in Charge Angley.
“Critical was the ability to leverage subject matter experts from the
Air Force’s acquisition community who provided the technical assessments of the
high value technology. While the
conclusion of this case neutralized the threat of this particular person, it
also highlights the need for continued and ever more vigilant protection of our
critical technologies.”
“Today's sentencing demonstrates the ongoing cooperation
between the U.S. Department of Commerce and other federal law enforcement
partners working together in unison to prevent sensitive U.S. origin technology
from falling into the wrong hands,” said Special Agent in Charge McKenna.
According to court documents and statements made in court,
at different times between 2001 and 2013, Khazaee, a dual citizen of Iran and
the United States with a Ph.D. in mechanical engineering, was employed by three
separate defense contractors. From at
least 2009 through late 2013, Khazaee offered to provide trade secret,
proprietary and export controlled defense technology that he had stolen from
his U.S. employers to gain employment with state-controlled technical
universities in Iran.
Beginning in late 2009, Khazaee corresponded by email with
an individual in Iran to whom he attempted to send and in some cases did send
documents containing trade secret, proprietary and export controlled material
relating to the Joint Strike Fighter (JSF) Program. In one email Khazaee stated that the material
he had attached was “very controlled . . . and I am taking [a] big risk.” Khazaee instructed the individual in Iran,
“after downloading,” he should “delete everything immediately.”
Analysis of Khazaee’s computer media also revealed cover
letters and application documents, dating from 2009 through late 2013, which
Khazaee sent to multiple state-controlled technical universities in Iran. In those materials, Khazaee stated that as
“lead engineer” in various projects with U.S. defense contractors, he had
learned “key technique[s] that could be transferred to our own industry and
universities.” Khazaee stated that he
wanted to “move to Iran,” that he was “looking for an opportunity to work in
Iran,” and that he was interested in “transferring my skill and knowledge to my
nation.”
In or about November 2013, while residing in Connecticut,
Khazaee attempted to send a large shipping container to Iran. The shipment included, in numerous boxes and
on computer media, thousands of highly sensitive technical manuals,
specification sheets, test results, technical drawings and data and other
proprietary material relating to U.S. military jet engines, including those
relating to the U.S. Air Force’s F35 JSF program and the F-22 Raptor. The materials in the interdicted shipment had
been stolen from U.S. defense contractors where Khazaee had worked and many
documents were prominently labeled with strict export control warnings. Khazaee did not apply for nor did he obtain
any license to export any of the documents and the export or attempted export
of such material to Iran is illegal.
On Jan. 9, 2014, Khazaee was arrested at the Newark Liberty
International Airport before boarding a flight to Iran. Search warrants executed on Khazaee’s checked
and carry-on luggage revealed additional hard copy documents and computer media
containing sensitive, proprietary, trade secret and export controlled documents
relating to U.S. military jet engines.
Khazaee was also found in the possession of $59,945.00 in as-yet undeclared
cash, which he had split up into increments of approximately $5,000 and
secreted in multiple bank envelopes in various places in his carry-on luggage.
The hard copy and electronic material that Khazaee stole and
sought to transfer to Iran totaled some 50,000 pages and was reviewed by experts
from both the U.S. Air Force and the victim defense contractors. In addition to the materials relating to the
JSF Program and the F-22 Raptor, Khazaee also had documents from numerous other
U.S. military engine programs, including the V-22 Osprey, the C130J Hercules
and the Global Hawk engine programs. In
total, Khazaee sought to export approximately 1,500 documents containing trade
secrets and approximately 600 documents containing highly sensitive defense technology.
According to analyses by the U.S. Air Force and victim
defense contractors, the technical data that Khazaee stole would have helped
Iran “leap forward” ten years or more in academic and military turbine engine
research and development, reducing their investment in such technology by one
to two billion dollars and potentially enhancing the development and
effectiveness of their weapon systems.
Khazaee has been detained since his arrest on Jan. 9,
2014. On Feb. 25, 2015, he pleaded
guilty to one count of unlawful export and attempted export of defense articles
from the U.S. in violation of the Arms Export Control Act.
This case was investigated by the ICE-HSI’ New England
Division, the FBI’s New Haven Division, the Defense Criminal Investigative
Service in New Haven, the U.S. Air Force’s Office of Special Investigations in
Boston and the Department of Commerce’s Office of Export Enforcement in Boston.
Assistant Attorney General Carlin and U.S. Attorney Daly
also commended the efforts of the many other agencies and offices that were involved
in this investigation, including the U.S. Attorney’s Offices of the Central
District of California, the Southern District of Indiana and the District of
New Jersey; ICE-HSI in Los Angeles; the U.S. Customs and Border Protection
Service (CBP) in Los Angeles; the U.S. Air Force’s Office of Special
Investigations in Los Angeles; as well as ICE-HSI, CBP and FBI in New Jersey;
and HSI, FBI and DCIS in Indianapolis.
This case is being prosecuted by Assistant U.S. Attorney
Stephen Reynolds of the District of Connecticut and Trial Attorney Brian
Fleming of the Justice Department’s Counterintelligence and Export Control
Section.
No comments:
Post a Comment