&w=3840&q=100)
Chinese-born California researcher pleads guilty to stealing space-based missile tech
The US Justice Department said Monday (July 21) that a Chinese-born US researcher admitted guilt to stealing trade secrets, including technology for detecting nuclear missile launches.
The man, identified as a 59-year-old Chenguang Gong, is a resident of San Jose, California.
Gong was charged with transferring over 3,600 files from his employer, a research and development company, to his personal storage devices.
In a central California district court, Gong pleaded guilty to one count of theft of trade secrets, facing up to 10 years in prison. His sentencing is scheduled for September 29.
STORY CONTINUES BELOW THIS AD
Having become a US citizen in 2011, Gong briefly worked as an engineer in 2023 at a Los Angeles-area research and development company, which was not named, the Justice Department stated.
The stolen files included blueprints for infrared sensors used in space-based systems to detect nuclear missile launches and track ballistic and hypersonic missiles, per the Justice Department. Additionally, Gong took blueprints for sensors enabling US military aircraft to detect incoming heat-seeking missiles and deploy countermeasures.
'The files Gong transferred include blueprints for sophisticated infrared sensors designed for use in space-based systems to detect nuclear missile launches and track ballistic and hypersonic missiles, as well as blueprints for sensors designed to enable US military aircraft to detect incoming heat-seeking missiles and take countermeasures, including by jamming the missiles' infrared tracking ability,' the Justice Department wrote in a press release.
Between 2014 and 2022, while employed at various major US technology companies, Gong applied to join Chinese government-funded 'Talent Programs,' the Justice Department noted. These programs aim to recruit individuals with 'expert skills, abilities, and knowledge of advanced sciences and technologies' to bolster China's economy and military capabilities.
'Gong also transferred files containing trade secrets relating to the development of 'next generation' sensors capable of detecting low observable targets while demonstrating increased survivability in space, as well as the blueprints for the mechanical assemblies used to house and cryogenically cool the victim company's sensors. This information was among the victim company's most important trade secrets that are worth hundreds of millions of dollars,' the department noted.
STORY CONTINUES BELOW THIS AD
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Hindustan Times
25 minutes ago
- Hindustan Times
Melina Frattolin case update: Dad Luciano Frattolin did not like ‘being tied down' by his daughter, ex-friend claims
Luciano Frattolin, the man accused of killing his nine-year-old daughter, Melina Frattolin, did not like being 'tied down' by his daughter, according to a former friend. Frattolin, 45, was on vacation with Melina in New York when she was killed. He now faces a murder charge. Luciano Frattolin was arrested after his daughter Melina Galanis Frattolin was found dead in New York.(Facebook/ New York State Police and Gambella Coffee Website) The friend told the Montreal Gazette that Frattolin spent most of his time in Ethiopia, where he was born and ran businesses like a mine and hotel construction project. The friend said, 'He loved his daughter, but he didn't like the idea of being tied down,' as per New York Post report. Also Read: Melina Frattolin case update: Father Luciano Frattolin arrested after body of Canadian girl found in Ticonderoga Luciano Frattolin allegedly cheated on his wife Frattolin used to live in Montreal but mostly stayed in Ethiopia. Melina lived in Canada with her mother. The mother had split from Frattolin after he allegedly cheated on her, the friend said. His only real ties to Montreal were his daughter and ex, according to the source, who said he stopped speaking to Frattolin after a business deal went wrong and 'some of the funds disappeared.' 'From what [Frattolin] said, he truly loved [Melina]. He would visit at least once a year,' the friend said. The friend also said Frattolin is a 'prominent' businessman in Ethiopia. He was born to an Ethiopian mother and an Italian father. In 2019, he co-founded an iron ore mine there with a Chinese company and secured a 20-year contract. That same year, he was reportedly attacked and suffered permanent damage to one of his eyes. While recovering from the injury, Melina's mother visited him in Ethiopia and found out he was seeing someone else.'That is why they separated,' the friend said. Frattolin later referred to the 2019 incident in a deleted online bio, calling it an 'unfortunate event' that 'severely affected his well-being' and led to a 'long and arduous' recovery. Luciano Frattolin faced various problems The friend said Frattolin had money problems and would often leave Ethiopia when things got tough, heading to Italy and coming back when things calmed down. The friend said, 'He had a lot of bills, so any time things were about to blow up, he would travel, and go back [to Ethiopia] once things cooled down.' Frattolin liked to keep up a flashy lifestyle. He wore expensive clothes and watches and only flew business class or better, the friend said. 'He was one of the first people to bring a Porsche into Ethiopia. He also had a Land Cruiser,' the friend added. 'He had two [luxury] cars, so in Ethiopia, he would be considered a very well-off person.' On Instagram, Frattolin once posted a video of himself driving the Porsche on dirt roads in Ethiopia, with a local tribesperson in the shot. Frattolin pleaded not guilty to murder on Monday in a court in Ticonderoga, New York,. He is expected back in court Friday.

The Hindu
27 minutes ago
- The Hindu
Bangladesh rights group demands 'independent investigation' into the air force jet crash that killed many in Dhaka
The crash of a military aircraft in Dhaka that killed a large number of students and teachers should be properly investigated and the interim government should publish the names of the victims who perished in this incident, said a human rights outfit that is highlighting the unfolding state of affairs in Bangladesh under the interim government. At a media event held in New Delhi on Wednesday (July 23, 2025) Mohammed Ali Siddiqui, secretary general of Bangladesh Human Rights Watch said the investigation into the incident should be 'above politics' and expressed solidarity with the affected people in the recent violent clashes in Gopalganj, the site of the memorial for the founder of Bangladesh Sheikh Mujibur Rahman. The event organised at the Press Club of India, was held even as Chief Adviser Prof Mohammed Yunus assured the affected families of relief and compensation. Earlier on Tuesday, a protest regarding the deadly crash turned into a clash between the protestors and the law and order authorities in Dhaka leaving several individuals injured. Mr Siddiqui said the interim government has 'failed to respond to the legitimate grievances of the grieving public' and said, 'On what should have been an ordinary day, the training jet of Bangladesh Air Force crashed onto the school grounds, resulting in the deaths and injuries of many innocent children, dedicated teachers and caring guardians, and the young pilot leaving the nation devastated.' The Bangladesh Human Rights Watch had organised the event mentioning that former ministers who were part of the deposed Sheikh Hasina-led Awami League government would participate in the event. Mr Siddiqui however said that in view of the tragic crash of the Bangladesh Air Force's Chinese-made F-7 aircraft in Dhaka, the leaders of the Bangladesh Awami League decided to stay away from the event while confirming that some of the top leaders of the Awami League are at present in New Delhi. He further told the reporters at the event that the Awami League which was banned by the interim government led by Prof. Mohammed Yunus will hold events in India in the near future. His team distributed several booklets including a pamphlet documenting the personal details of 110 Members of Parliament of the Awami League and its coalition partners who were sent to prison after the interim government took charge. Beginning with the fall of the Sheikh Hasina government on 5 August 2024, the law and order situation in Bangladesh has been marked by frequent clashes between groups, attacks on vulnerable communities and a perceived rise in extremist forces. India has been protesting the attacks on minority religious communities and urged Bangladesh last week to hold an 'inclusive' election. India on Tuesday joined China and Japan in assuring assistance to the victims of the deadly fighter jet crash in Dhaka. The Ministry of External Affairs had said, 'A team of burn-specialist doctors and nurses with necessary medical support are scheduled to visit Dhaka shortly to treat the victims.'


NDTV
an hour ago
- NDTV
Chinese Hackers Attack US Nuclear Weapons Agency Using SharePoint Loophole, Says Microsoft
Microsoft has linked a wave of cyberattacks targeting its SharePoint servers to Chinese state-backed hackers, including well-known groups Violet Typhoon and Linen Typhoon, as well as a third group, Storm-2603. The US National Nuclear Security Administration (NNSA), which is responsible for maintaining the country's nuclear weapons stockpile, was among the organisations breached. However, no sensitive or classified information is believed to have been compromised, Interesting Engineering reported, citing a source. In a blogpost published on July 22, Microsoft noted that probes into other actors also using these exploits are still underway. "With the rapid adoption of these exploits, Microsoft assesses with high confidence that threat actors will continue to integrate them into their attacks against unpatched on-premises SharePoint systems." The hackers exploited critical vulnerabilities in Microsoft's SharePoint software, specifically zero-day vulnerabilities, including CVE-2025-53770, to gain remote access to networks and steal credentials. The affected customers are those who operate the software on their internal servers instead of Microsoft's cloud-based services. "These attacks highlight the growing sophistication and global scale of cyber threats," Microsoft said. "Early exploitation resembled government-sponsored activity, and then spread more widely to include hacking that looks like China," said Adam Meyers, senior vice president at CrowdStrike. Meyers further added that the extent of the campaign is still being analysed. The attacks began on July 18, said an Energy Department spokesperson, further adding that damage was limited because of the department's use of Microsoft's cloud services. "Our systems are built with multiple levels of security," the official said as quoted. Bloomberg reported that hackers also attacked other systems at the US Department of Education, Florida's Department of Revenue, and the Rhode Island General Assembly. However, these departments haven't confirmed or denied it yet. The report mentioned that over 100 organisations have been compromised worldwide, including government agencies, energy companies, consulting firms and universities. The breaches have said to have affected organisations across multiple sectors and countries, including the US, Europe, and the Middle East. Microsoft has released security updates addressing the exploited vulnerabilities and urged all customers to apply patches without delay. The company has also hired government security executives and holds weekly senior leadership meetings focused on improving software resilience. "There were ways around the patches," said Vaisha Bernard, Eye Security's chief hacker and co-owner said as quoted. "That allowed these attacks to happen." China denies allegations The Chinese Embassy in Washington has denied the allegations. In a statement, the embassy said, "At the same time, we also firmly oppose smearing others without solid evidence." "We hope that relevant parties will adopt a professional and responsible attitude when characterising cyber incidents, basing their conclusions on sufficient evidence rather than unfounded speculation and accusations." The breach highlights the ongoing threat posed by Chinese state-sponsored cyber espionage operations allegedly targeting critical US infrastructure and the need for robust cybersecurity measures to protect sensitive government and corporate networks.