Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China

Posted on July 23, 2025July 23, 2025 By CWS

A twin U.S.-China citizen and former Silicon Valley engineer has pleaded responsible to stealing essential navy know-how secrets and techniques designed to guard American nationwide safety pursuits. 

Chenguang Gong, 59, of San Jose, admitted to transferring over 3,600 categorised recordsdata containing superior missile detection and protection applied sciences to non-public storage gadgets, with intentions to learn the Chinese language authorities by their expertise recruitment packages.

Key Takeaways1. Engineer Chenguang Gong pleaded responsible to stealing 3,600+ categorised missile protection recordsdata for China.2. Stolen blueprints included superior infrared sensors and built-in circuits.3. Gong participated in Chinese language expertise packages for 8 years, faces 10 years in jail.

US Missile Tech Stolen for China

The stolen know-how represents a few of America’s most refined protection capabilities, centering on application-specific built-in circuits (ASICs) and readout built-in circuits (ROICs) designed for essential navy functions. 

These proprietary methods embody blueprints for infrared sensors engineered for space-based missile detection platforms able to figuring out nuclear missile launches and monitoring each ballistic and hypersonic missiles. 

The know-how additionally encompasses superior sensor designs that allow U.S. navy plane to detect incoming heat-seeking missiles and deploy digital countermeasures, together with refined jamming methods that disrupt the missiles’ infrared monitoring capabilities.

Throughout his temporary tenure from January to April 2023 at a Los Angeles-area analysis and growth firm, Gong systematically transferred recordsdata containing commerce secrets and techniques value a whole bunch of thousands and thousands of {dollars}. 

The stolen blueprints included specs for mechanical assemblies used to deal with and cryogenically cool infrared sensors, in addition to “subsequent era” sensor applied sciences able to detecting low observable targets whereas sustaining enhanced survivability in area environments. 

Many recordsdata had been clearly marked with safety classifications together with “PROPRIETARY INFORMATION,” “FOR OFFICIAL USE ONLY,” and “EXPORT CONTROLLED”.

Investigation revealed Gong’s in depth participation in China’s expertise recruitment packages spanning from 2014 to 2022. 

He submitted a number of functions proposing to develop high-performance analog-to-digital converters (ADCs) and low-light picture sensors for navy functions, particularly emphasizing their use in radar methods and missile navigation platforms. 

In his proposals, Gong explicitly acknowledged that these ADCs “straight decide the accuracy and vary of radar methods” and are important elements in “missile navigation methods”.

Regulation enforcement found that Gong traveled to China a number of occasions in search of funding for these tasks, regardless of working for American navy contractors. 

The meant financial loss from his felony conduct exceeds $3.5 million, with Gong going through a most penalty of 10 years in jail at his September sentencing.

Enhance detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now 

Cyber Security News Tags:China, Data, Detection, Engineer, Guilty, Missile, Pleads, Silicon, Stealing, Valley

Post navigation

Previous Post: Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials
Next Post: How Businesses Prevent Credential Theft with Early Phishing Detection

Related Posts

Kimsuky APT Data Leak – GPKI Certificates, Rootkits and Cobalt Strike Personal Uncovered Cyber Security News
New eSIM Hack Let Attackers Clone Profiles and Hijack Phone Identities Cyber Security News
Threat Actors Leverage Google Apps Script To Host Phishing Websites Cyber Security News
Integrating Threat Intelligence into Security Operations Centers Cyber Security News
Threat actors Breach High Value targets like Google in Salesforce Attacks Cyber Security News
VS Code Extension Weaponized With Two Lines of Code Leads to Supply Chain Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Progress OpenEdge AdminServer Vulnerability Let Attackers Execute Remote Code
  • Windows Defender Vulnerability Allows Service Hijacking and Disablement via Symbolic Link Attack
  • GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies
  • Chinese Spies Impersonated US Lawmaker to Deliver Malware to Trade Groups: Report 
  • GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Progress OpenEdge AdminServer Vulnerability Let Attackers Execute Remote Code
  • Windows Defender Vulnerability Allows Service Hijacking and Disablement via Symbolic Link Attack
  • GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies
  • Chinese Spies Impersonated US Lawmaker to Deliver Malware to Trade Groups: Report 
  • GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News