Uncategorized

Silicon Valley Engineer Admits to Stealing U.S. Missile Detection Data for Chinese Government

A former engineer at a Southern California defense contractor has admitted to stealing classified missile detection technologies worth hundreds of millions of dollars, marking another significant case of industrial espionage targeting U.S. military capabilities.

Chenguang Gong, 59, a dual U.S.-China citizen from San Jose, pleaded guilty to theft of trade secrets and faces up to 10 years in prison when sentenced in September.

Gong’s cybercriminal activities unfolded during a remarkably short tenure at a Los Angeles-area research and development company, where he worked as an application-specific integrated circuit design manager from January to April 2023.

During this brief period, he systematically transferred more than 3,600 proprietary files from his work laptop to three personal storage devices, with over 1,800 files stolen after he had already accepted a position with a competing company.

The stolen materials were discovered on storage devices seized from Gong’s temporary residence in Thousand Oaks.

Many of the files bore classifications including “PROPRIETARY,” “FOR OFFICIAL USE ONLY,” and “EXPORT CONTROLLED,” indicating their sensitive nature and restricted access requirements.

Law enforcement found that Gong began his theft campaign on March 30, 2023, and continued until his termination on April 26, 2023.

Stolen Technology

The pilfered files contained blueprints and specifications for some of America’s most advanced missile detection and defense technologies.

Among the stolen materials were designs for sophisticated infrared sensors used in space-based systems capable of detecting nuclear missile launches and tracking both ballistic and hypersonic missiles.

These systems represent cutting-edge technology crucial to U.S. national security and early warning capabilities.

Additionally, Gong stole blueprints for sensors that enable U.S. military aircraft to detect incoming heat-seeking missiles and deploy countermeasures, including jamming the missiles’ infrared tracking systems.

The stolen files also included specifications for “next generation” sensors designed to detect low observable targets while maintaining increased survivability in space environments, along with blueprints for mechanical assemblies used to house and cryogenically cool these sensitive instruments.

Chinese Government Collaboration

Federal investigators uncovered evidence of Gong’s extensive involvement with Chinese government talent recruitment programs spanning from 2014 to 2022.

These programs, administered by the People’s Republic of China, are designed to identify individuals with expertise in advanced sciences and technologies to enhance China’s economic and military capabilities.

During his career at major U.S. technology companies, Gong submitted numerous applications to these talent programs, proposing to develop military-applicable technologies for China.

In 2014, while employed at a Dallas-based IT company, he sent a business proposal to a Chinese research institute outlining plans to produce high-performance analog-to-digital converters. A 2020 application detailed his proposal to develop military night vision systems.

Gong traveled to China multiple times seeking funding for these projects, acknowledging in a 2019 email that he “took a risk” by participating in talent programs while working for an American military contractor.

He expressed his intention to contribute to China’s “high-end military integrated circuits” development, with prosecutors estimating the intended economic loss from his actions exceeds $3.5 million.

Gong remains free on $1.75 million bond pending his September 29 sentencing before U.S. District Judge John F. Walter.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

Ethan Brooks

Ethan Brooks is a Senior cybersecurity journalist passionate about threat intelligence and data privacy. His work highlights cyber attacks, hacking, security culture, and cybercrime with The Cyber News.

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago