Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China

Posted on July 23, 2025July 23, 2025 By CWS

A twin U.S.-China citizen and former Silicon Valley engineer has pleaded responsible to stealing essential navy know-how secrets and techniques designed to guard American nationwide safety pursuits. 

Chenguang Gong, 59, of San Jose, admitted to transferring over 3,600 categorised recordsdata containing superior missile detection and protection applied sciences to non-public storage gadgets, with intentions to learn the Chinese language authorities by their expertise recruitment packages.

Key Takeaways1. Engineer Chenguang Gong pleaded responsible to stealing 3,600+ categorised missile protection recordsdata for China.2. Stolen blueprints included superior infrared sensors and built-in circuits.3. Gong participated in Chinese language expertise packages for 8 years, faces 10 years in jail.

US Missile Tech Stolen for China

The stolen know-how represents a few of America’s most refined protection capabilities, centering on application-specific built-in circuits (ASICs) and readout built-in circuits (ROICs) designed for essential navy functions. 

These proprietary methods embody blueprints for infrared sensors engineered for space-based missile detection platforms able to figuring out nuclear missile launches and monitoring each ballistic and hypersonic missiles. 

The know-how additionally encompasses superior sensor designs that allow U.S. navy plane to detect incoming heat-seeking missiles and deploy digital countermeasures, together with refined jamming methods that disrupt the missiles’ infrared monitoring capabilities.

Throughout his temporary tenure from January to April 2023 at a Los Angeles-area analysis and growth firm, Gong systematically transferred recordsdata containing commerce secrets and techniques value a whole bunch of thousands and thousands of {dollars}. 

The stolen blueprints included specs for mechanical assemblies used to deal with and cryogenically cool infrared sensors, in addition to “subsequent era” sensor applied sciences able to detecting low observable targets whereas sustaining enhanced survivability in area environments. 

Many recordsdata had been clearly marked with safety classifications together with “PROPRIETARY INFORMATION,” “FOR OFFICIAL USE ONLY,” and “EXPORT CONTROLLED”.

Investigation revealed Gong’s in depth participation in China’s expertise recruitment packages spanning from 2014 to 2022. 

He submitted a number of functions proposing to develop high-performance analog-to-digital converters (ADCs) and low-light picture sensors for navy functions, particularly emphasizing their use in radar methods and missile navigation platforms. 

In his proposals, Gong explicitly acknowledged that these ADCs “straight decide the accuracy and vary of radar methods” and are important elements in “missile navigation methods”.

Regulation enforcement found that Gong traveled to China a number of occasions in search of funding for these tasks, regardless of working for American navy contractors. 

The meant financial loss from his felony conduct exceeds $3.5 million, with Gong going through a most penalty of 10 years in jail at his September sentencing.

Enhance detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Attempt ANY.RUN Now 

Cyber Security News Tags:China, Data, Detection, Engineer, Guilty, Missile, Pleads, Silicon, Stealing, Valley

Post navigation

Previous Post: Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials
Next Post: How Businesses Prevent Credential Theft with Early Phishing Detection

Related Posts

New DuplexSpy RAT Let Attackers Gain Complete Control of Windows Machine Cyber Security News
Adobe Photoshop Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News
Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware Cyber Security News
Threat Actors Weaponizing GitHub Accounts To Host Payloads, Tools and Amadey Malware Plug-Ins Cyber Security News
Microsoft Authenticator to Discontinue Password Support and Cease Operations by August 2025 Cyber Security News
Fog Ransomware Actors Exploits Pentesting Tools to Exfiltrate Data and Deploy Ransomware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: $30k Google Cloud Build Flaw, Louis Vuitton Breach Update, Attack Surface Growth
  • Strengthening Security Measures In Digital Advertising Platforms
  • Mitel Patches Critical Flaw in Enterprise Communication Platform
  • Hackers Leverage Google Forms Surveys to Trick Victims into Stealing Cryptocurrency
  • Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: $30k Google Cloud Build Flaw, Louis Vuitton Breach Update, Attack Surface Growth
  • Strengthening Security Measures In Digital Advertising Platforms
  • Mitel Patches Critical Flaw in Enterprise Communication Platform
  • Hackers Leverage Google Forms Surveys to Trick Victims into Stealing Cryptocurrency
  • Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News