Tag Archives: infrared sensor theft

Engineer

Engineer Caught in Explosive Plot to Leak U.S. Missile Secrets to China

A former engineer from Santa Clara County has pleaded guilty to stealing critical U.S. military trade secrets involving advanced infrared sensor technologies. These top-secret files—designed to detect nuclear missile launches, track hypersonic threats, and protect fighter jets—were quietly transferred to personal storage devices during his brief stint at a Southern California defense firm. The accused, Chenguang Gong, a U.S.-China dual citizen, is also linked to Chinese government talent programs. The case unveils a silent breach with deep defense implications, now drawing sharp scrutiny from federal investigators.

STORY HIGHLIGHTS:

  • Defendant: Chenguang Gong, dual citizen (U.S.–China), age 59

  • Charge: Theft of U.S. military trade secrets

  • Employment: Brief stint at a Southern California R&D defense firm in 2023

  • Stolen Data: Over 3,600 files, including classified sensor blueprints

  • Economic Damage: Estimated loss over $3.5 million

  • China Connection: Applied to PRC-run Talent Programs between 2014–2022

  • Court Status: Sentencing on September 29; faces up to 10 years

In a striking development with implications for both national security and international tech espionage, a former engineer based in California has admitted to stealing closely guarded U.S. military technology. Chenguang Gong, 59, a San Jose resident and dual citizen of the United States and China, pleaded guilty this week in a Los Angeles federal court to one count of theft of trade secrets.

Gong, once employed at a Southern California defense contractor, is now at the center of a serious breach involving advanced infrared sensor systems developed to safeguard U.S. military interests. These technologies include mechanisms to detect nuclear missile launches, track hypersonic and ballistic missiles, and protect U.S. fighter aircraft from incoming heat-seeking threats.

Though he remains out on a $1.75 million bond, Gong’s sentencing is scheduled for September 29, where he could face up to 10 years in federal prison.

The case sheds light on the complex vulnerabilities surrounding proprietary defense technology and the ways in which it may be compromised from within.

According to the plea agreement filed by federal prosecutors, Gong joined the unnamed victim company in January 2023 as a design manager specializing in application-specific integrated circuits for infrared sensors. These sensors are considered essential components in America’s defense strategy, with applications extending to space-based systems designed to detect early-stage nuclear threats and to safeguard aircraft operating in hostile environments.

Gong’s tenure, though brief, raised immediate red flags. Beginning around March 30, 2023, and continuing through his termination on April 26, Gong copied thousands of sensitive files from his company-issued laptop to personal storage devices. Notably, over 1,800 of those files were transferred after Gong had already secured employment with a competitor of his then-employer — raising further concerns about the intent and ultimate destination of the data.

Among the stolen documents were proprietary blueprints for infrared sensors capable of detecting and neutralizing heat-seeking missiles. Many files bore explicit designations such as “PROPRIETARY INFORMATION,” “FOR OFFICIAL USE ONLY,” and “EXPORT CONTROLLED.”

Investigators later discovered these files at Gong’s temporary residence in Thousand Oaks, California, where he had stored them on multiple external devices. Federal prosecutors stressed the high value of the data, noting that the information related to the company’s next-generation sensor technologies could be worth hundreds of millions of dollars.

But Gong’s activities did not appear to begin with this one employer. In fact, federal documents revealed that between 2014 and 2022, Gong had a pattern of engagement with government-backed “Talent Programs” run by the People’s Republic of China. These initiatives are designed to attract individuals working in high-level scientific and technological fields, often with the goal of advancing China’s national defense capabilities.

In 2014, while employed at a U.S. tech company headquartered in Dallas, Gong sent a proposal to a Chinese research institute that focused on both civilian and military-grade technologies. The plan involved developing “high-performance analog-to-digital converters” similar to those made by his U.S. employer.

In another application submitted in 2020, Gong detailed a project to develop “low light/night vision” sensors for use in both military and civilian scopes — an effort that included a video presentation. That video even referenced a model number associated with a sensor he worked on at a major international aerospace and defense contractor between 2015 and 2019.

In a translated email from 2019, Gong revealed an awareness of the potential risks tied to his actions.

“I took a risk by traveling to China to participate in these Talent Programs,” he wrote.
“Because I worked for an American military industry company, I knew the sensitivity. But I thought I could still do something to help with China’s high-end military integrated circuits.”

Investigators also discovered that Gong had emphasized the military relevance of the converters he intended to develop in China, writing that such technology “directly determines the accuracy and range of radar systems,” and is often integral to “missile navigation systems.”

Assistant U.S. Attorneys David C. Lachman and Nisha Chandran, alongside Trial Attorney Brendan Geary of the National Security Division’s Counterintelligence and Export Control Section, are leading the prosecution.

The case is being investigated by the FBI’s Los Angeles Field Office’s Counterintelligence Task Force, with substantial cooperation from the State Department’s Diplomatic Security Service, Homeland Security Investigations, and the FBI’s San Francisco Field Office.

As Gong awaits sentencing, the case stands as a stark reminder of the continued challenges facing national security — not just from external adversaries, but also from those who operate within trusted institutions.

The case of Chenguang Gong serves as a stark reminder of the growing vulnerabilities in America’s defense and technology sectors. As federal authorities continue to investigate the broader implications, this incident underscores the silent, high-stakes threat of intellectual property theft linked to foreign state interests. With national security on the line, the spotlight now turns to the balance between innovation, trust, and the safeguarding of sensitive technologies that protect the nation’s most critical defense systems.

Appreciating your time:

We appreciate you taking the time to read our most recent article! We appreciate your opinions and would be delighted to hear them. We value your opinions as we work hard to make improvements and deliver material that you find interesting.

Post a Comment:

In the space provided for comments below, please share your ideas, opinions, and suggestions. We can better understand your interests thanks to your input, which also guarantees that the material we offer will appeal to you. Get in Direct Contact with Us: Please use our “Contact Us” form if you would like to speak with us or if you have any special questions. We are open to questions, collaborations, and, of course, criticism. To fill out our contact form, click this link.

Stay Connected:

Don’t miss out on future updates and articles.