Silicon Valley Engineer Pleads Guilty in U.S. Missile Detection Data Theft Case

Silicon Valley Engineer Pleads Guilty in U.S. Missile Detection Data Theft Case

A Silicon Valley engineer with dual U.S.-China citizenship pleaded guilty to stealing critical defense technologies worth hundreds of millions of dollars, including classified systems designed to detect nuclear missile launches and track hypersonic weapons.

The case highlights growing concerns about economic espionage and technology transfer to foreign adversaries.

Engineer Admits to Massive Data Theft

Chenguang Gong, 59, of San Jose, pleaded guilty to one count of theft of trade secrets in federal court, marking the conclusion of a significant counterintelligence investigation.

The former engineer remains free on $1.75 million bond while awaiting sentencing scheduled for September 29, where he faces up to 10 years in federal prison.

During his brief tenure at a Los Angeles-area research and development company in 2023, Gong systematically transferred more than 3,600 sensitive files to personal storage devices.

The stolen data included blueprints for sophisticated infrared sensors designed for space-based missile detection systems and countermeasure technologies for military aircraft.

The compromised files contained proprietary designs for readout integrated circuits that enable space-based systems to detect nuclear missile launches and track both ballistic and hypersonic missiles.

Additionally, Gong stole blueprints for sensors that allow U.S. fighter aircraft to detect incoming heat-seeking missiles and deploy electronic countermeasures, including systems capable of jamming missile guidance systems.

Court documents reveal that Gong began transferring files on March 30, 2023, and continued until his termination on April 26, 2023.

Significantly, more than 1,800 files were stolen after Gong had already accepted employment with one of his company’s main competitors, suggesting premeditated corporate espionage.

The investigation uncovered Gong’s extensive participation in China’s government-sponsored talent recruitment programs between 2014 and 2022.

These programs, administered by the People’s Republic of China, specifically target individuals with expertise in advanced sciences and technologies to enhance China’s military capabilities.

In multiple applications to these programs, Gong proposed developing high-performance military technologies, including analog-to-digital converters for radar systems and night vision sensors for military applications.

In a 2019 email translated from Chinese, Gong acknowledged taking risks by participating in these programs while employed at American defense companies, expressing his desire to contribute to China’s “high-end military integrated circuits.”

The case represents part of a broader pattern of technology theft targeting American defense contractors.

The stolen technologies were marked with various security classifications, including “FOR OFFICIAL USE ONLY” and “EXPORT CONTROLLED,” indicating their sensitive nature and potential national security implications.

Federal prosecutors estimate the intended economic loss from Gong’s criminal conduct exceeds $3.5 million, though the strategic value of the compromised technologies likely far exceeds this figure.

The investigation was conducted by the FBI’s Los Angeles and San Francisco field offices, working alongside the State Department’s Diplomatic Security Service and Homeland Security Investigations.

This prosecution underscores the ongoing challenges facing American technology companies and defense contractors in protecting critical innovations from foreign intelligence operations and economic espionage efforts.

Get Free Ultimate SOC Requirements Checklist Before you build, buy, or switch your SOC for 2025 - Download Now


Source link