CRIME Honeywell Fined Millions Over Exporting Sensitive Info On F-22, F-35, And More To China

Bps1691

Veteran Member
Honeywell Fined Millions Over Exporting Sensitive Weapon System Info To China
Honeywell Fined Millions Over Exporting Sensitive Info On F-22, F-35, And More To China

The U.S. government and defense contractor Honeywell have reached a settlement over alleged violations of portions of the Arms Export Control Act, or AECA, and the International Traffic in Arms Regulations, or ITAR. The matter at hand had to do with Honeywell's alleged unauthorized export of dozens of technical drawings relating to components of various aircraft, missiles, and tanks, including the F-35 Joint Strike Fighter, the F-22 Raptor stealth fighter, the B-1B bomber, the Tomahawk cruise missile, and the M1A1 Abrams, to multiple countries, including China.

American officials contend that some of the disclosures harmed national security, something that Honeywell denies.

The U.S. State Department announced the deal, in which Honeywell agreed to pay $13 million in civil penalties, among other things. Of that amount, the payment of $5 million was immediately suspended on the condition that the company put it toward "remedial compliance measures." In addition, the U.S. government chose not to pursue more serious action based on Honeywell "voluntarily" disclosing the exports that violated the AECA and ITAR, which the State Department also continues to describe as alleged as a result of the settlement.

"The settlement demonstrates the Department’s role in strengthening U.S. industry by protecting U.S.-origin defense articles, including technical data, from unauthorized exports," according to a press release from the State Department. "The settlement also highlights the importance of obtaining appropriate authorization from the Department for exporting controlled articles."

"Honeywell voluntarily disclosed to the Department the alleged violations that are resolved under this settlement. Honeywell also acknowledged the serious nature of the alleged violations, cooperated with the Department’s review, and instituted a number of compliance program improvements during the course of the Department’s review," according to that statement. "For these reasons, the Department has determined that it is not appropriate to administratively debar Honeywell at this time."

The charging document in the case, now made public through the State Department's Directorate of Defense Trade Controls, says that "Honeywell ultimately identified 71 ITAR-controlled drawings that between July 2011 and October 2015 it had exported without authorization," in a disclosure it voluntarily made in 2016. Two years later, the firm acknowledged a second set of unapproved exports "that were similar to the violations disclosed in the first voluntary disclosure," according to the State Department.

All of these alleged exports had to do with drawings that "contained engineering prints showing layouts, dimensions, and geometries for manufacturing castings and finished parts for multiple aircraft, military electronics, and gas turbine engines" used on various aircraft and ground vehicles. The documents were shared via DEXcenter, "a file exchange platform" that the Honeywell employees in question typically use to "transfer drawings to suppliers."

That document includes the following list of impacted platforms, with a caveat that this was only some of the examples, rather than a full accounting:

It's worth pointing out that the A-7H was a variant of the A-7E developed specifically for Greece's Hellenic Air Force and that the Corsair II series, as a whole, has been out of U.S. military service now for decades. The Greeks formally retired the last of their A-7s in 2014.

Honeywell is alleged to have made unauthorized exports of drawings related to components "that are used in platforms including in the F-35 Joint Strike Fighter, M1A1 Abrams Tank, Tactical Tomahawk Missile, B-1B Lancer Long-Range Strategic Bomber, and F-22 Fighter Aircraft platforms as well as the T55 and CTS800 turboshaft engines to the PRC [People's Republic of China]," specifically, according to the State Department. "The U.S. Government reviewed copies of the 71 drawings and determined that exports to and retransfers in the PRC of drawings for certain parts and components for the engine platforms for the F-35 Joint Strike Fighter, B-1B Lancer Long-Range Strategic Bomber, and the F-22 Fighter Aircraft harmed U.S. national security."

The CTS800 engine, not mentioned in the earlier list, was originally designed to power the RAH-66A Comanche stealth helicopter. Today, it is found in the Leonardo AW159 Wildcat helicopter, used by the U.K. Royal Navy, among others, and the Turkish T129 ATAK attack helicopter, among others.

Additional alleged unauthorized exports of drawings were made to Canada, Mexico, Ireland, and Taiwan. However, the U.S. government did not assess any of these incidents to have directly impacted national security, according to the charging document.

Honeywell has disputed the national security implications of the transfers, which it first disclosed to the U.S. government in 2018.

"The issues Honeywell reported involved technology that was assessed as having no impact on national security and is commercially available throughout the world," the company said in a statement. "No detailed manufacturing or engineering expertise was shared."


more at
 

hiwall

Has No Life - Lives on TB
So let's say you worked for this corporation. You saw what was happening and you were mad about it.
You want to report it. Would you call Democratic headquarters, er, I mean the FBI?
Or call directly to the Bidet/China White House?
 

Weps

Veteran Member
What no prison time. Or just part of the deal. A BS trial. ITAR specifically spells out what can and can’t be done. They want us to believe this was a mistake?

Who got paid? And this was under Obama.

The best part is, if you allowed a friend that wasn't a US citizen to simply look threw a pair of Gen 3 NODs you owned or read the owners manual, they can throw you in prison for a decade.

It gets even better;

"Honeywell voluntarily disclosed to the Department the alleged violations that are resolved under this settlement. Honeywell also acknowledged the serious nature of the alleged violations, cooperated with the Department’s review, and instituted a number of compliance program improvements during the course of the Department’s review," according to that statement. "For these reasons, the Department has determined that it is not appropriate to administratively debar Honeywell at this time."

In other words; "Honeywell supplies so many parts and provides gargantuan amounts of support to critical systems that we can't risk losing them, so we're going to slap them on the wrist to give the appearance that we're doing something.

The charging document in the case, now made public through the State Department's Directorate of Defense Trade Controls, says that "Honeywell ultimately identified 71 ITAR-controlled drawings that between July 2011 and October 2015 it had exported without authorization," in a disclosure it voluntarily made in 2016. Two years later, the firm acknowledged a second set of unapproved exports "that were similar to the violations disclosed in the first voluntary disclosure," according to the State Department.

Here is where you know smoke is being blown up the public's backside; ITAR violations carry a $1M fine PER VIOLATION; 71 instances of ITAR violation between 2011 and 2015, then Honeywell discloses it happened again...yet we see Honeywell is fined $13M, with $5M suspended because Honeywell promised to "change" their compliance procedures.

A closing question; How exactly did Honeywell "accidently" transmit sensitive information that is highly controlled to NON-ALLIES? How much did Honeywell make for selling transmitting controlled information?
 
Last edited:

Zagdid

Veteran Member
The gallo
So let's say you worked for this corporation. You saw what was happening and you were mad about it.
You want to report it. Would you call Democratic headquarters, er, I mean the FBI?
Or call directly to the Bidet/China White House?
The gallows in the front are now reserved for whistle blowers.
 

ShadowMan

Designated Grumpy Old Fart
They need to find the person(s) responsible and put them up against a wall, with a firing squad and SHOOT THEM!!

Until we start to REALLY deal with traitors and spies this crap will continue.
iu
 

Grumphau

Veteran Member
A closing question; How exactly did Honeywell "accidently" transmit sensitive information that is highly controlled to NON-ALLIES? How much did Honeywell make for selling transmitting controlled information?

I can think of one painfully easy scenario:
A team of engineers stores classified schematics on a "secure" SharePoint and learns through an audit that one person, Chinese national, had permissions to the site but not the proper clearance (obviously).

Or an email gets sent with the files attached to a group of engineers, and one of them is a foreign contractor... lots of slip ups can happen in the digital age; some are more obvious than others.
 
So let's say you worked for this corporation. You saw what was happening and you were mad about it.
You want to report it. Would you call Democratic headquarters, er, I mean the FBI?
Or call directly to the Bidet/China White House?
Or, one could make an economic life-changing decision that will impact they and their family, by resigning and moving laterally with their career, and live to fight another day.

How many have chosen this path? <not enough>

"They that control the money, rule."


intothegoodnight
 
Last edited:

TheSearcher

Are you sure about that?
There are many ways to violate ITAR, not every "transmission" is intentional. In fact, most aren't.

Say you hold a sensitive meeting, via telecon. If you have a foreign person in the remote location, you don't know about them, and they see the presentation or pick up materials, you have transmitted information to a foreign national. The technology data can be a bearing with a special coating just for your design and your design is deemed "munitions related" and an ITAR violation. The bearing and the coating may be commercially available separately, but are a custom application because you combined them. Not exotic, not even classified, just unique, maybe not even meant to be used in munitions, but somebody else decides it is a munitions and now you're out if compliance.

The above scenario and many others like it constitute most ITAR escapements, and the bigger your company is the more chances you get to step off the path. It's also why companies like Honeywell self-report immediately.

Most ITAR issues are not cloak-and-dagger, usually it's poor information control or someone on the other end of the communication not being honest about what people are being allowed to access the data.
 

NoDandy

Has No Life - Lives on TB
Someone should be hanged
Agree !!!

Round up everyone involved. Honeywell personel, politicians, bureaucrats, etc. Charge them all with treason.

Have a jury of American citizens. Upon conviction, hang them all. Public. Broadcast it on national TV, C-Span, etc. Make sure everyone sees it, and knows the true cost of treason!

Any do gooders that try to interfere, hang them too !!!

It is bad enough that politicians get away with what they do! IT IS TIME FOR THE $HIT TO BE STOPPED !!!!

:ld: :mad::mad::mad::mad::mad::mad::mad::mad:
 

Walrus

Veteran Member
There are many ways to violate ITAR, not every "transmission" is intentional. In fact, most aren't.

Say you hold a sensitive meeting, via telecon. If you have a foreign person in the remote location, you don't know about them, and they see the presentation or pick up materials, you have transmitted information to a foreign national. The technology data can be a bearing with a special coating just for your design and your design is deemed "munitions related" and an ITAR violation. The bearing and the coating may be commercially available separately, but are a custom application because you combined them. Not exotic, not even classified, just unique, maybe not even meant to be used in munitions, but somebody else decides it is a munitions and now you're out if compliance.

The above scenario and many others like it constitute most ITAR escapements, and the bigger your company is the more chances you get to step off the path. It's also why companies like Honeywell self-report immediately.

Most ITAR issues are not cloak-and-dagger, usually it's poor information control or someone on the other end of the communication not being honest about what people are being allowed to access the data.
And that's not to mention even being aware of the FCPA (Foreign Corrupt Practices Act) quagmire.
 
There are many ways to violate ITAR, not every "transmission" is intentional. In fact, most aren't.

Say you hold a sensitive meeting, via telecon. If you have a foreign person in the remote location, you don't know about them, and they see the presentation or pick up materials, you have transmitted information to a foreign national. The technology data can be a bearing with a special coating just for your design and your design is deemed "munitions related" and an ITAR violation. The bearing and the coating may be commercially available separately, but are a custom application because you combined them. Not exotic, not even classified, just unique, maybe not even meant to be used in munitions, but somebody else decides it is a munitions and now you're out if compliance.

The above scenario and many others like it constitute most ITAR escapements, and the bigger your company is the more chances you get to step off the path. It's also why companies like Honeywell self-report immediately.

Most ITAR issues are not cloak-and-dagger, usually it's poor information control or someone on the other end of the communication not being honest about what people are being allowed to access the data.
Once a digital copy slips outside of the classified corral, it is infinitely reproducible by ANYONE, regardless of its classified nature/markings and original information control intentions.

There was a time when this sort of issue was prevented from happening by classified document handling/monitoring/auditing/tracking processes with teeth - we have become lazy and sloppy, prizing expediency over preventative processes and procedures with regards to classified information dissemination. Welcome the rise of the truly disbursed international corporations and many foreign employees spread across the face of the earth, all connected by the ubiquitous 24/7 internet and its miraculous information hunting/vacuuming capabilities.

The pre-internet techies saw this problem coming, decades ago. Despite being loud about it, they were ignored/sacrificed on the altar of money/profits/global blending/subsuming of sovereign governments and their nationalistic perspectives - corporations über alles.


intothegoodnight
 

TheSearcher

Are you sure about that?
Once a digital copy slips outside of the classified corral, it is infinitely reproducible by ANYONE, regardless of its classified nature/markings and original information control intentions.

There was a time when this sort of issue was prevented from happening by classified document handling/monitoring/auditing/tracking processes with teeth - we have become lazy and sloppy, prizing expediency over preventative processes and procedures with regards to classified information dissemination. Welcome the rise of the truly disbursed international corporations and many foreign employees spread across the face of the earth, all connected by the ubiquitous 24/7 internet and its miraculous information hunting/vacuuming capabilities.

The pre-internet techies saw this problem coming, decades ago. Despite being loud about it, they were ignored/sacrificed on the altar of money/profits/global blending/subsuming of sovereign governments and their nationalistic perspectives - corporations über alles.


intothegoodnight

The only way that level of absolute security is achievable is if you classify everything and conduct all meetings face to face. That's never been a practical proposition, though I would agree that the telecommuting age has made it easier to have a good old "oops" breach.

I'm just trying to convey that not all escapements are spying events, or acts of treason. Most aren't even classified data breaches.
 

Weps

Veteran Member
There are many ways to violate ITAR, not every "transmission" is intentional. In fact, most aren't.

Say you hold a sensitive meeting, via telecon. If you have a foreign person in the remote location, you don't know about them, and they see the presentation or pick up materials, you have transmitted information to a foreign national. The technology data can be a bearing with a special coating just for your design and your design is deemed "munitions related" and an ITAR violation. The bearing and the coating may be commercially available separately, but are a custom application because you combined them. Not exotic, not even classified, just unique, maybe not even meant to be used in munitions, but somebody else decides it is a munitions and now you're out if compliance.

The above scenario and many others like it constitute most ITAR escapements, and the bigger your company is the more chances you get to step off the path. It's also why companies like Honeywell self-report immediately.

Most ITAR issues are not cloak-and-dagger, usually it's poor information control or someone on the other end of the communication not being honest about what people are being allowed to access the data.

Certainly unintended release of unclassified, but controlled information happens on occasion. However, the article outlines the State Department reviewed the drawings that were transmitted and determined that some level of harm to national security had occurred.

It can certainly seem inconsequential that controlled information pertaining to a particular commercially available bearing and coating in a specific design application is leaked...until a nation like China silently moves to purchase and control the manufacture of those bearings and coating; much like they've done with REE and other critical defense-related commercial products, minerals, ect...

Not every leak is going to provide the aggressor with the combination to Fort Knox, but it certainly can lead to unforeseen national security or nation defense repercussions down the road.

We are talking about two incidents that resulted in the release of, at a minimum, 71 ITAR controlled documents related to combat systems that; "contained engineering prints showing layouts, dimensions, and geometries for manufacturing castings and finished parts for multiple aircraft, military electronics, and gas turbine engines" used on various aircraft and ground vehicles."

Again, while it may have been unintentional, it's certainly a windfall for the PRC if they wanted to use the data to preform sabotage, move to manufacture the parts for internal use form previously stolen designs, or simply wage economic/industrial warfare to control the manufacture of those parts and components.

Folks have died trying to just take pictures of vehicles like the T-80 and Honeywell sent the Chicom's copies of engineering prints of a huge amount of combat systems on accident.
 

Attachments

  • 685px-INF3-232_Anti-rumour_and_careless_talk_You_never_know_who's_on_the_wires_(Hitler_figure_...jpg
    685px-INF3-232_Anti-rumour_and_careless_talk_You_never_know_who's_on_the_wires_(Hitler_figure_...jpg
    165.8 KB · Views: 4

TheSearcher

Are you sure about that?
Certainly unintended release of unclassified, but controlled information happens on occasion. However, the article outlines the State Department reviewed the drawings that were transmitted and determined that some level of harm to national security had occurred.

It can certainly seem inconsequential that controlled information pertaining to a particular commercially available bearing and coating in a specific design application is leaked...until a nation like China silently moves to purchase and control the manufacture of those bearings and coating; much like they've done with REE and other critical defense-related commercial products, minerals, ect...

Not every leak is going to provide the aggressor with the combination to Fort Knox, but it certainly can lead to unforeseen national security or nation defense repercussions down the road.

We are talking about two incidents that resulted in the release of, at a minimum, 71 ITAR controlled documents related to combat systems that; "contained engineering prints showing layouts, dimensions, and geometries for manufacturing castings and finished parts for multiple aircraft, military electronics, and gas turbine engines" used on various aircraft and ground vehicles."

Again, while it may have been unintentional, it's certainly a windfall for the PRC if they wanted to use the data to preform sabotage, move to manufacture the parts for internal use form previously stolen designs, or simply wage economic/industrial warfare to control the manufacture of those parts and components.

Folks have died trying to just take pictures of vehicles like the T-80 and Honeywell sent the Chicom's copies of engineering prints of a huge amount of combat systems on accident.

Please don't focus on just the one example. I don't disagree with what you're saying, I'm trying to point out maybe why Honeywell heads weren't rolling around the public square.

It sounds like in one case, the normal data repository was compromised and allowed Chicom access. If the users of the repository didn't know until after the fact, that is a security hole for which the contractor is liable. Some of the escapes may have been to pass-along communications to unapproved parties and not directly from Honeywell. Either way, it sounds like espionage was not Honeywell's doing, though there is the possibility that a HW employee may have engaged in spying.

This is why the fine was smaller than it could have been, and half of it was set aside to exclusively plug Honeywell's security gaps.
 
Top