Department of Justice
Office of Public Affairs
FOR IMMEDIATE RELEASE
Tuesday, March 7, 2017
ZTE Corporation Agrees to Plead Guilty and Pay Over $430.4 Million for Violating U.S. Sanctions by Sending U.S.-Origin Items to Iran
Combined Penalty of $1.19 Billion with Department of Commerce and Department of Treasury Actions Shows All of Government Approach to Sanctions Enforcement
ZTE Corporation has agreed to enter a guilty plea and to pay a $430,488,798 penalty to the U.S. for conspiring to violate the International Emergency Economic Powers Act (IEEPA) by illegally shipping U.S.-origin items to Iran, obstructing justice and making a material false statement. ZTE simultaneously reached settlement agreements with the U.S. Department of Commerce’s Bureau of Industry and Security (BIS) and the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC). In total ZTE has agreed to pay the U.S. Government $892,360,064. The BIS has suspended an additional $300,000,000, which ZTE will pay if it violates its settlement agreement with the BIS.
Attorney General of the United States Jeff Sessions, Acting Assistant Attorney General for National Security Mary B. McCord, U.S. Attorney John R. Parker for the Northern District of Texas and FBI Assistant Director Bill Priestap for the Counterintelligence Division made the announcement today.
“ZTE Corporation not only violated export controls that keep sensitive American technology out of the hands of hostile regimes like Iran’s – they lied to federal investigators and even deceived their own counsel and internal investigators about their illegal acts,” said Attorney General Sessions. “This plea agreement holds them accountable, and makes clear that our government will use every tool we have to punish companies who would violate our laws, obstruct justice and jeopardize our national security. I am grateful to the Justice Department’s National Security Division, the U.S. Attorney’s Office for the Northern District of Texas and the FBI for their outstanding work on this investigation.”
“ZTE engaged in an elaborate scheme to acquire U.S.-origin items, send the items to Iran and mask its involvement in those exports. The plea agreement alleges that the highest levels of management within the company approved the scheme. ZTE then repeatedly lied to and misled federal investigators, its own attorneys and internal investigators. Its actions were egregious and warranted a significant penalty,” said Acting Assistant Attorney General McCord. “The enforcement of U.S. export control and sanctions laws is a major component of the National Security Division’s commitment to protecting the national security of the United States. Companies that violate these laws – including foreign companies – will be investigated and held to answer for their actions.”
“ZTE Corporation not only violated our export control laws but, once caught, shockingly resumed illegal shipments to Iran during the course of our investigation,” said U.S. Attorney Parker. “ZTE Corporation then went to great lengths to devise elaborate, corporate-wide schemes to hide its illegal conduct, including lying to its own lawyers.”
“The plea agreement in this case shows ZTE repeatedly violated export controls and illegally shipped U.S. technology to Iran,” said Assistant Director Priestap. “The company also took extensive measures to hide what it was doing from U.S. authorities. This case is an excellent example of cooperation among multiple U.S. agencies to uncover illegal technology transfers and make those responsible pay for their actions.”
The plea agreement, which is contingent on the court’s approval, also requires ZTE to submit to a three-year period of corporate probation, during which time an independent corporate compliance monitor will review and report on ZTE’s export compliance program. ZTE is also required to cooperate fully with the Department of Justice (DOJ) regarding any criminal investigation by U.S. law enforcement authorities. The plea agreement ends a five-year joint investigation into ZTE’s export practices, which was handled by the DOJ’s National Security Division, the U.S. Attorney’s Office for the Northern District of Texas, the FBI, the BIS and the Department of Homeland Security, U.S. Immigration and Customs Enforcement’s Homeland Security Investigations.
A criminal information was filed today in federal court in the Northern District of Texas charging ZTE with one count of knowingly and willfully conspiring to violate the IEEPA, one count of obstruction of justice and one count of making a material false statement. ZTE waived the requirement of being charged by way of federal indictment, agreed to the filing of the information and has accepted responsibility for its criminal conduct by entering into a plea agreement with the government. The plea agreement, which is contingent on the court’s approval, requires that ZTE pay a fine in the amount of $286,992,532 and a criminal forfeiture in the amount of $143,496,266. The criminal fine represents the largest criminal fine in connection with an IEEPA prosecution.
Summary of the Criminal Conduct
According to documents filed today, for a period of almost six years, ZTE obtained U.S.-origin items – including controlled dual-use goods on the Department of Commerce’s Commerce Control List (CCL) – incorporated some of those items into ZTE equipment and shipped the ZTE equipment and U.S.-origin items to customers in Iran. ZTE engaged in this conduct knowing that such shipments to Iran were illegal. ZTE further lied to federal investigators during the course of the investigation when it insisted, through outside and in-house counsel, that the company had stopped sending U.S.-origin items to Iran. In fact, while the investigation was ongoing, ZTE resumed its business with Iran and shipped millions of dollars’ worth of U.S. items there.
ZTE also created an elaborate scheme to hide the data related to these transactions from a forensic accounting firm hired by defense counsel to conduct a review of ZTE’s transactions with sanctioned countries. It did so knowing that the information provided to the forensic accounting firm would be reported to the U.S. government by outside counsel. Outside counsel was not aware of this scheme and indeed was wholly unaware that ZTE had resumed business with Iran. After ZTE informed its counsel of the scheme, counsel reported – with permission from ZTE – the conduct to the U.S. government.
The Iran Business
According to court documents, between January 2010 and January 2016, ZTE, either directly or indirectly through a third company, shipped approximately $32,000,000 of U.S.-origin items to Iran without obtaining the proper export licenses from the U.S. government. In early 2010, ZTE began bidding on two different Iranian projects. The projects involved installing cellular and landline network infrastructure. Each contract was worth hundreds of millions of U.S. Dollars and required U.S. components for the final products.
In December 2010, ZTE finalized the contracts with Iranian customers. The contracts were signed by four parties: the Iranian customer, ZTE, Beijing 8 Star and ZTE Parsian. Court documents explain that ZTE identified Beijing 8 Star (8S) as a possible vehicle for hiding its illegal shipments of U.S. items to Iran. It intended to use 8S to export U.S.-origin items from China to ZTE customers in Iran. As part of this plan, ZTE supplied 8S with necessary capital and took over control of the company.
Under the terms of the Iran contracts, ZTE agreed to supply the “self-developed equipment,” collect payments for the projects and manage the whole network. ZTE Parsian was to provide locally purchased materials and all services. 8S was responsible for “relevant third-party equipment,” which primarily meant parts that would be subject to U.S. export laws. ZTE intended for 8S to be an “isolation company,” that is, ZTE intended for 8S (rather than ZTE) to purchase the embargoed equipment from suppliers and provide that equipment under the contract in an effort to distance ZTE from U.S. export-controlled products and insulate ZTE from U.S. export violations. However, 8S had no purchasing or shipping history and no real business reputation.
Ultimately, although 8S was a party to the contracts, ZTE itself purchased and shipped the embargoed goods under the contract. In its shipping containers, it packaged the U.S. items with its own self-manufactured items to hide the U.S.-origin goods. ZTE did not include the U.S. items on the customs declaration forms, though it did include the U.S.-origin items on the packing lists included inside of the shipments.
In early 2011, when ZTE determined that the use of 8S was insufficient to hide ZTE’s connection to the illegal export of U.S.-origin goods to Iran, senior management of ZTE ordered that a company-level export control project team study, handle and respond to the company’s export control risks. In September 2011, four senior managers signed an Executive Memo, which proposed that the company identify and establish new “isolation companies” that would be responsible for supplying U.S. component parts necessary for projects in embargoed countries. The isolation companies would conceal ZTE’s role in the transshipment scheme and would insulate ZTE from export control risks.
In March 2012, Reuters published an article regarding ZTE’s sale of equipment to Iran. In response, ZTE made a decision to temporarily cease sending new U.S. equipment to Iran. By November 2013, however, ZTE had resumed its business with Iran. Beginning in July 2014, ZTE began shipping U.S.-origin equipment to Iran once again without the necessary licenses.
Instead of using 8S, however, ZTE identified a new isolation company. ZTE signed a contract with the new isolation company, which in turn signed contracts with the two Iranian customers. According to the new scheme, ZTE purchased and manufactured all relevant equipment – both U.S.-origin and ZTE-manufactured – and prepared them for pick-up at its warehouse by the new isolation company. The new isolation company then shipped all items to the Iranian customers. Shipments to Iran continued from January 2014 through January 2016.
The Obstruction and False Statement
According to court documents, despite its knowledge of an ongoing grand jury investigation into its Iran exports, ZTE took several steps to conceal relevant information from the U.S. government. It further took affirmative steps to mislead the U.S. government. In the summer of 2012, ZTE asked each of the employees who were involved in the Iran sales to sign nondisclosure agreements in which the employees agreed to keep confidential all information related to the company’s U.S. exports to Iran.
During meetings throughout late 2014, late 2015 and early 2016, outside counsel for ZTE, unaware that the statements ZTE had given to counsel for communication to the government were false, represented to the DOJ and federal law enforcement agents that ZTE had stopped doing business with Iran and therefore was no longer violating U.S. export laws. Similarly, on July 8, 2015, in-house counsel for ZTE accompanied outside counsel in a meeting with the DOJ and federal law enforcement agents and reported that ZTE was abiding by U.S. laws. That statement was also false.
ZTE also hid data related to its resumed illegal sales to Iran from a forensic accounting firm hired by defense counsel to conduct an internal investigation into the company’s Iran sales. ZTE knew the forensic accounting firm was reviewing its systems and knew that the analysis was being reported to the DOJ and U.S. law enforcement. To avoid detection of its 2013-2016 resumed illegal sales to Iran, ZTE formed the “contract data induction team” (“CDIT”). The CDIT was comprised of approximately 13 people whose job it was to “sanitize the databases” of all information related to the 2013-2016 Iran business. The team identified and removed from the databases all data related to those sales. ZTE also established an auto-delete function for the email accounts of those 13 individuals on the CDIT, so their emails were deleted every night – a departure from its normal practices – to ensure there were no communications related to the hiding of the data.
The case is being prosecuted by Deputy Chief Elizabeth Cannon of the National Security Division’s Counterintelligence and Export Control Sections and Assistant U.S. Attorney Mark Penley of the Northern District of Texas.
Counterintelligence and Export Control
Updated March 7, 2017