Score:   1
Docket Number:   ED-NY  1:18-cr-00457
Case Name:   USA v. Huawei Technologies Co. LTD et al
  Press Releases:
BROOKLYN, N.Y. – A 13-count indictment was unsealed earlier today in federal court in Brooklyn, New York, charging four defendants,[1] all of whom are affiliated with Huawei Technologies Co. Ltd. (Huawei), the world’s largest telecommunications equipment manufacturer, with headquarters in the People’s Republic of China (PRC) and operations around the world.  The indicted defendants include Huawei and two Huawei subsidiaries — Huawei Device USA Inc. (Huawei USA) and Skycom Tech Co. Ltd. (Skycom) — as well as Huawei’s Chief Financial Officer (CFO) Wanzhou Meng (Meng).

The defendants Huawei and Skycom are charged with bank fraud and conspiracy to commit bank fraud, wire fraud and conspiracy to commit wire fraud, conspiracy to defraud the United States, conspiracy to violate and substantive violations of the International Emergency Economic Powers Act (IEEPA), and conspiracy to commit money laundering.  Huawei and Huawei USA are charged with conspiracy to obstruct justice related to the Grand Jury investigation in the Eastern District of New York.  Meng is charged with bank fraud, wire fraud, and conspiracy to commit bank and wire fraud.

Matthew G. Whitaker, Acting United States Attorney General, Richard P. Donoghue, United States Attorney for the Eastern District of New York, Brian A. Benczkowski, Assistant Attorney General of the Justice Department's Criminal Division, John C. Demers, Assistant Attorney General of the Justice Department’s National Security Division, Christopher A. Wray, Director, Federal Bureau of Investigation (FBI),  Kirstjen Nielsen, Secretary, U.S. Department of Homeland Security, and Wilbur Ross, Secretary, U.S. Department of Commerce, announced the charges.

“Today we are announcing that we are bringing criminal charges against telecommunications giant Huawei and its associates for nearly two dozen alleged crimes,” stated Acting Attorney General Whitaker.  “As I told Chinese officials in August, China must hold its citizens and Chinese companies accountable for complying with the law.  I’d like to thank the many dedicated criminal investigators from several different federal agencies who contributed to this investigation and the Department of Justice attorneys who are moving the prosecution efforts forward. They are helping us uphold the rule of law with integrity.”

“As charged in the indictment, Huawei and its subsidiaries, with the direct and personal involvement of their executives, engaged in serious fraudulent conduct, including conspiracy, bank fraud, wire fraud, sanctions violations, money laundering and the orchestrated obstruction of justice,” stated United States Attorney Donoghue.  “For over a decade, Huawei employed a strategy of lies and deceit to conduct and grow its business.  This Office will continue to hold accountable companies and their executives, whether here or abroad, that commit fraud against U.S. financial institutions and their international counterparts and violate U.S. laws designed to maintain our national security.”  Mr. Donoghue thanked the FBI, U.S. Immigration and Customs Enforcement’s Homeland Security Investigations, U.S. Department of Commerce Office of Export Enforcement and the Defense Criminal Investigative Service agents who are investigating this case for their tireless work and dedication.

“These charges lay bare Huawei’s blatant disregard for the laws of our country and standard global business practices,” stated FBI Director Wray.  “Companies like Huawei pose a dual threat to both our economic and national security, and the magnitude of these charges make clear just how seriously the FBI takes this threat. Today should serve as a warning that we will not tolerate businesses that violate our laws, obstruct justice, or jeopardize national and economic well-being.”

“As charged in the indictment, Huawei and its Chief Financial Officer broke U.S. law and have engaged in a fraudulent financial scheme that is detrimental to the security of the United States,” stated U.S. Department of Homeland Security Secretary Nielsen.  “They willfully conducted millions of dollars in transactions that were in direct violation of the Iranian Transactions and Sanctions Regulations, and such behavior will not be tolerated.  The Department of Homeland Security is focused on preventing nefarious actors from accessing or manipulating our financial system, and we will ensure that legitimate economic activity is not exploited by our adversaries.  I would like to thank ICE Homeland Security Investigations for their exceptional work on this case.”

“For years, Chinese firms have broken our export laws and undermined sanctions, often using the U.S. financial systems to facilitate their illegal activities,” stated U.S. Department of Commerce Secretary Ross.  “This will end.  The Trump Administration continues to be tougher on those who violate our export control laws than any administration in history. I commend the Department’s Office of Export Enforcement, and our partners in the FBI, Justice Department, Department of Defense, and Department of Homeland Security for their excellent work on this case.”

* * * *

Overview of the Indictment

The charges in this case relate to a long-running scheme by Huawei, its CFO, and other employees to deceive numerous global financial institutions and the United States government regarding Huawei’s business activities in Iran.  Beginning in 2007, Huawei employees misrepresented Huawei’s relationship to an unofficial subsidiary in Iran called Skycom, and as a result falsely claimed that Huawei had only limited operations in Iran and that Huawei did not violate U.S. or other laws or regulations related to Iran.  Most significantly, after news publications in late 2012 and 2013 disclosed that Huawei operated Skycom as an unofficial subsidiary in Iran and that Meng had served on the board of directors of Skycom, Huawei employees, and in particular Meng, continued to lie to Huawei’s banking partners about Huawei’s relationship with Skycom, falsely claiming that Huawei had sold its interest in Skycom to an unrelated third party in 2007 and also that Skycom was merely Huawei’s local business partner in Iran.  In reality, Skycom was Huawei’s longstanding Iranian subsidiary, and Huawei orchestrated the 2007 sale to appear as an arm’s length transaction between two unrelated parties although Huawei actually controlled the company that purchased Skycom. 

As part of this scheme to defraud, Meng personally made a presentation in August 2013 to an executive of one of Huawei’s major banking partners in which she repeatedly lied about the relationship between Huawei and Skycom. 

Huawei relied on its global banking partners for banking services that included processing U.S.-dollar-denominated transactions through the United States.  U.S. laws and regulations generally prohibited these banks from providing U.S.-dollar transactions related to Iran through the United States.  The banks could have faced civil or criminal penalties for processing transactions that violated U.S. laws or regulations.  Relying on the repeated misrepresentations by Huawei, banking partners continued their banking relationships with Huawei.  One banking partner cleared more than $100 million worth of Skycom-related transactions through the United States between 2010 and 2014.

As a further part of this scheme to defraud, Huawei and its principals repeatedly lied to U.S. government authorities about the relationship between Huawei and Skycom in submissions to the U.S. government, and in responses to government inquiries.  For example, Huawei provided false information to the U.S. Congress regarding whether Huawei’s business in Iran violated any U.S. law.  Similarly, as indicated in the indictment, in 2007 — months before Huawei orchestrated the purported sale of Skycom to another Huawei-controlled entity — Huawei’s founder falsely stated to FBI agents that Huawei did not have any direct dealings with Iranian companies and that Huawei operated in compliance with all U.S. export laws. 

After one of Huawei’s major global banking partners (identified as Financial Institution 1 in the indictment) decided to exit the relationship in 2017 because of Huawei’s risk profile, Huawei allegedly made additional misrepresentations to several of its remaining banking partners in an effort to maintain and expand those relationships.  Huawei and its principals are alleged to have repeatedly and falsely claimed that Huawei had decided to separate from Financial Institution 1, and not that Financial Institution 1 had decided to cause the separation.  On the basis of these misrepresentations, those other banking partners continued their banking relationships with Huawei.

In 2017, when Huawei became aware of the government’s investigation, Huawei and its subsidiary Huawei USA tried to obstruct the investigation by making efforts to move witnesses with knowledge about Huawei’s Iran-based business to the PRC, and beyond the jurisdiction of the U.S. government, and by destroying and concealing evidence of Huawei’s Iran-based business that was located in the United States.

In December 2018, Canadian authorities apprehended Meng in Vancouver pursuant to a provisional arrest warrant issued under Canadian law.  The U.S. government is seeking Meng’s extradition to the United States.

The charges in the indictment are merely allegations, and the defendants are presumed innocent unless and until proven guilty.

The indictment unsealed today is assigned to U.S. District Judge Ann M. Donnelly of the Eastern District of New York.

The government’s investigation is ongoing.  Individuals and companies with information about additional misconduct by these defendants or their related entities and principals should contact their local FBI field office.

The investigation is being jointly conducted by the FBI’s New York Field Office, HSI’s New York Field Office, OEE’s New York Field Office, and DCIS’s New York Resident Agency.  Agents from the FBI, HSI, OEE, and DCIS offices in Dallas provided significant support and assistance.  The government’s case is being handled by the National Security and Cybercrime and Business and Securities Fraud Sections of the U.S. Attorney’s Office for the Eastern District of New York, Justice Department’s Criminal Division’s Money Laundering and Asset Recovery Section (MLARS), and Justice Department’s National Security Division’s Counterintelligence and Export Control Section (CES). 

Assistant U.S. Attorneys Alexander A. Solomon, Julia Nestor, David K. Kessler, Kaitlin Farrell, and Sarah Evans, MLARS Trial Attorneys Laura Billings and Christian Nauvel, and CES Trial Attorneys Thea D. R. Kendler and David Lim are in charge of the prosecution, with assistance provided by Assistant U.S. Attorney Mark Penley of the Northern District of Texas, Assistant U.S. Attorneys Brian Morris and Brendan King of the Eastern District of New York’s Civil Division and Trial Attorneys Andrew Finkelman and Margaret O’Malley of DOJ’s Office of International Affairs.  Additional Criminal Division and National Security Division Trial Attorneys and Assistant U.S. Attorneys within U.S. Attorney’s Offices for the Northern District of Texas, the Eastern District of Texas, and the Northern District of California have provided valuable assistance with various aspects of this investigation.

The Defendants:

Huawei Technologies Co. Ltd.

Huawei Device USA Inc.

Skycom Tech Co. Ltd.

Meng Wanzhou, also known as “Cathy Meng” and “Sabrina Meng”

Age: 46

Residence: People’s Republic Of China

E.D.N.Y. Docket No. 18-CR-457 (AMD)

 



[1] The indictment charges other individuals who have not yet been apprehended and whose names will not be publicly released at this time.





Docket (0 Docs):   https://docs.google.com/spreadsheets/d/1KR96e14AfOFLvYXq_WtoXmUoncO14MY5S1DOQ93oQUM
  Last Updated: 2024-03-27 00:43:10 UTC
Description: The fiscal year of the data file obtained from the AOUSC
Format: YYYY

Description: The code of the federal judicial circuit where the case was located
Format: A2

Description: The code of the federal judicial district where the case was located
Format: A2

Description: The code of the district office where the case was located
Format: A2

Description: Docket number assigned by the district to the case
Format: A7

Description: A unique number assigned to each defendant in a case which cannot be modified by the court
Format: A3

Description: A unique number assigned to each defendant in a case which can be modified by the court
Format: A3

Description: A sequential number indicating whether a case is an original proceeding or a reopen
Format: N5

Description: Case type associated with the current defendant record
Format: A2

Description: A concatenation of district, office, docket number, case type, defendant number, and reopen sequence number
Format: A18

Description: A concatenation of district, office, docket number, case type, and reopen sequence number
Format: A15

Description: The status of the defendant as assigned by the AOUSC
Format: A2

Description: A code indicating the fugitive status of a defendant
Format: A1

Description: The date upon which a defendant became a fugitive
Format: YYYYMMDD

Description: The date upon which a fugitive defendant was taken into custody
Format: YYYYMMDD

Description: The date when a case was first docketed in the district court
Format: YYYYMMDD

Description: The date upon which proceedings in a case commenced on charges pending in the district court where the defendant appeared, or the date of the defendant’s felony-waiver of indictment
Format: YYYYMMDD

Description: A code used to identify the nature of the proceeding
Format: N2

Description: The date when a defendant first appeared before a judicial officer in the district court where a charge was pending
Format: YYYYMMDD

Description: A code indicating the type of legal counsel assigned to a defendant
Format: N2

Description: The title and section of the U.S. Code applicable to the offense committed which carried the highest severity
Format: A20

Description: A code indicating the level of offense associated with FTITLE1
Format: N2

Description: The four digit AO offense code associated with FTITLE1
Format: A4

Description: The four digit D2 offense code associated with FTITLE1
Format: A4

Description: A code indicating the severity associated with FTITLE1
Format: A3

Description: The title and section of the U.S. Code applicable to the offense committed which carried the second highest severity
Format: A20

Description: A code indicating the level of offense associated with FTITLE2
Format: N2

Description: The four digit AO offense code associated with FTITLE2
Format: A4

Description: The four digit D2 offense code associated with FTITLE2
Format: A4

Description: A code indicating the severity associated with FTITLE2
Format: A3

Description: The title and section of the U.S. Code applicable to the offense committed which carried the third highest severity
Format: A20

Description: A code indicating the level of offense associated with FTITLE3
Format: N2

Description: The four digit AO offense code associated with FTITLE3
Format: A4

Description: The four digit D2 offense code associated with FTITLE3
Format: A4

Description: A code indicating the severity associated with FTITLE3
Format: A3

Description: The title and section of the U.S. Code applicable to the offense committed which carried the fourth highest severity
Format: A20

Description: A code indicating the level of offense associated with FTITLE4
Format: N2

Description: The four digit AO offense code associated with FTITLE4
Format: A4

Description: The four digit D2 offense code associated with FTITLE4
Format: A4

Description: A code indicating the severity associated with FTITLE4
Format: A3

Description: The title and section of the U.S. Code applicable to the offense committed which carried the fifth highest severity
Format: A20

Description: A code indicating the level of offense associated with FTITLE5
Format: N2

Description: The four digit AO offense code associated with FTITLE5
Format: A4

Description: The four digit D2 offense code associated with FTITLE5
Format: A4

Description: A code indicating the severity associated with FTITLE5
Format: A3

Description: The FIPS code used to indicate the county or parish where an offense was committed
Format: A5

Description: The date of the last action taken on the record
Format: YYYYMMDD

Description: The date upon which judicial proceedings before the court concluded
Format: YYYYMMDD

Description: The date upon which the final sentence is recorded on the docket
Format: YYYYMMDD

Description: The date upon which the case was closed
Format: YYYYMMDD

Description: The total fine imposed at sentencing for all offenses of which the defendant was convicted and a fine was imposed
Format: N8

Description: A count of defendants filed including inter-district transfers
Format: N1

Description: A count of defendants filed excluding inter-district transfers
Format: N1

Description: A count of original proceedings commenced
Format: N1

Description: A count of defendants filed whose proceedings commenced by reopen, remand, appeal, or retrial
Format: N1

Description: A count of defendants terminated including interdistrict transfers
Format: N1

Description: A count of defendants terminated excluding interdistrict transfers
Format: N1

Description: A count of original proceedings terminated
Format: N1

Description: A count of defendants terminated whose proceedings commenced by reopen, remand, appeal, or retrial
Format: N1

Description: A count of defendants pending as of the last day of the period including long term fugitives
Format: N1

Description: A count of defendants pending as of the last day of the period excluding long term fugitives
Format: N1

Description: The source from which the data were loaded into the AOUSC’s NewSTATS database
Format: A10

Description: A sequential number indicating the iteration of the defendant record
Format: N2

Description: The date the record was loaded into the AOUSC’s NewSTATS database
Format: YYYYMMDD

Description: Statistical year ID label on data file obtained from the AOUSC which represents termination year
Format: YYYY

Data imported from FJC Integrated Database
F U C K I N G P E D O S R E E E E E E E E E E E E E E E E E E E E