U.S.-China Dual Citizen Pleads Guilty to Stealing Missile-Tracking Tech from L.A. Firm

Chenguang Gong, a 59-year-old resident of San Jose, pled guilty on Monday to stealing missile-tracking technology from a research and development firm in the Los Angeles area.

The Department of Justice (DOJ) described Gong as a dual citizen of the United States and China. He came to the United States around 1993 and became a U.S. citizen in 2011. He earned a Master of Science degree in electrical engineering from Clemson and has done Ph.D. work at Stanford.

He was hired by the unnamed research and development firm in January 2023 as an “application-specific integrated circuit design manager responsible for the design, development and verification of its infrared sensors.”

Three months after he was hired, Gong allegedly began downloading thousands of files from his work computer to “personal storage devices.” Many of those files contained proprietary data and trade secrets, including details of a space-based system for detecting missile launches and tracking hypersonic weapons.

The company Gong took the files from was also involved with designing sensors that allow American military aircraft to detect and defeat heat-seeking missiles.

Gong was terminated by the “victim company” in April 2023. By that time, he had evidently accepted a job at a competing company, but he was still downloading sensitive files to his personal storage devices. DOJ said the data he downloaded was “worth hundreds of millions of dollars.”

Investigators digging into Gong’s background discovered he applied to Communist China’s “Talent Programs” on numerous occasions between 2014 and 2022, during which time he worked for “several major technology companies in the United States.”

China has several initiatives for aggressively recruiting foreign technology experts, the most infamous being the Thousand Talents Program (TTP). U.S. intelligence and law enforcement agencies say the talent programs have often been used to recruit espionage agents and steal valuable intellectual property for China.

Keep reading

Microsoft ends use of China-based computer engineers for certain Defense Dept projects amid espionage fears

Microsoft said it will cease using China-based computer engineering teams for work on Pentagon cloud systems, after an investigation this week led to national security concerns at the highest levels over a program that Microsoft has used since 2016.

ProPublica report released Tuesday accused Microsoft of allowing China-based engineers to assist with Pentagon cloud systems with inadequate guardrails in an effort to scale up its government contracting business. 

The report got the attention of GOP lawmakers and the Trump administration, with Defense Secretary Pete Hegseth insisting Friday that foreign engineers from “any country … should NEVER be allowed to maintain or access DOD systems.” He added that the Defense Department would be “looking into this ASAP.”

After Hegseth’s indication that the Pentagon would be looking into the matter, Fox News Digital reached out to Microsoft, which responded that it would be ceasing its use of China-based computer engineers providing assistance to sensitive Defense Department cloud “and related” services.

Keep reading

Why is South Korea retrying a spy chief who assassinated a president?

Two gunshots.

That is how Yoo Seok-sul begins recounting the night of Friday, 26 October, 1979.

A former security guard in the Korea Central Intelligence Agency, or KCIA, as the South’s spy division was known, Yoo has many stories to tell. But this is perhaps the most infamous.

He remembers the time – nearly 19:40 – and where he had been sitting – in the break room. He was resting after his shift guarding the entrance to the low-rise compound where President Park Chung-hee entertained his most trusted lieutenants. They called it the “safe house”.

In his 70s now, wiry with sharp eyes, Yoo speaks hesitantly at first – but it comes back to him quickly. After the first shots, more gunfire followed, he says. The guards were on high alert but they waited outside for orders. The president’s security detail was inside, along with the KCIA’s top agents.

Then Yoo’s boss, a KCIA officer who oversaw security for the safe house, stepped outside. “He came over and asked me to bury something in the garden.” It was two guns, bullets and a pair of shoes. Flustered, Yoo followed orders, he says.

He did not know who had been shot, and he didn’t ask.

“I never imagined that it was the president.”

The guns Yoo buried were used to assassinate Park Chung-hee, who had ruled South Korea for the previous 18 years, longer than any president before or since. The man who shot him was his long-time friend Kim Jae-gyu, who ran the much-feared KCIA, a pillar of Park’s dictatorship.

That Friday shook South Korea, ending Park Chung-hee’s stifling rule and ushering in another decade under the military. Kim was executed for insurrection, along with five others.

Now, 46 years later, that night is back in the spotlight as a court retries Kim Jae-gyu to determine if his actions amounted to treason. He has remained a deeply polarising figure – some see him as a killer blinded by power and ambition, others as a patriot who sacrificed himself to set South Korea on the path to democracy. The president he killed is no less divisive, lauded for his country’s economic rise and reviled for his authoritarian rule.

Kim’s family fought for the retrial, arguing that he cannot be remembered as a traitor. They will now have their day in the Seoul High Court – hearings began on Wednesday – just as impeached president Yoon Suk Yeol goes on trial for the same charge that sent Kim to the gallows.

Yoon’s martial law order last December was short-lived but it threw up questions about South Korean democracy – and that may influence how the country sees a man who shot dead a dictator he claimed was on the brink of unleashing carnage.

Was Kim trying to seize power for himself or to spark a revolution, as he claimed in court?

Keep reading

Fighting against Chinese cyber-espionage, FBI hunts down members of Chinese hacking networks

When Chinese national Xu Zewei stepped off a plane at Milan’s Malpensa airport for a vacation with his wife, Italian authorities arrested him. The Italians executed an American warrant issued by investigators for his alleged role in the most prolific Beijing-backed cyber-espionage campaign in recent years.

Before Xu’s July 3 arrest, the Justice Department often charged alleged Chinese hackers in absentia. But now, the Trump administration has detained for the first time one of Beijing’s suspected cyber operators as part of its wider effort to combat Chinese espionage against the United States.

The Justice Department announced Xu’s arrest earlier this week and outlined the charges against him as part of a nine-count indictment along with one codefendant. The pair are accused of involvement in computer intrusions that compromised personal data, intellectual property, COVID-19 research at U.S. universities, and law firm materials, the Justice Department said. 

The arrest of Xu Zewei in Italy marks one of the first recorded cases of the FBI apprehending a suspected Chinese hacker. The FBI’s Houston Field Office, which led the case, said in a social media post shortly after the announcement that Xu Zewei was “one of the first hackers linked to Chinese intelligence services to be captured by the FBI.” 

Keep reading

Two Chinese Nationals Arrested, Accused of Espionage Targeting U.S. Navy Personnel

Two individuals believed to be working on behalf of the Chinese Communist Party’s intelligence agency have been arrested by U.S. authorities for allegedly spying on U.S. Navy service members and recruiting military personnel to assist their efforts.

The Department of Justice (DOJ) announced that Yuance Chen, residing in Happy Valley, Oregon, and Liren Lai, who entered the country on a tourist visa and was apprehended in Houston, Texas, were taken into custody last Friday. 

Both men face serious charges for acting as agents of China’s Ministry of State Security (MSS)—the country’s primary foreign intelligence service—conducting covert operations across the United States.

According to the DOJ, the pair engaged in a range of clandestine activities, including gathering sensitive information on Navy bases and personnel, facilitating cash payments through “dead drop” techniques and attempting to recruit U.S. Navy members to cooperate with the MSS.

FBI Director Kash Patel emphasized the importance of these arrests in protecting national security.

Keep reading

Britain’s Long History of Spying on Iran

As bombs fell on Iran last month, the U.K. government claimed it had “not participated” in the military action led by Israel and the U.S. 

But British spy agencies have a long history of meddling in Iran, with everything from covert influence operations, to secretly selling chemical weapons materials to the regime.

In one case, the U.K. spy agency Government Communications Headquarters (GCHQ) even created a network of fake Twitter accounts to secretly monitor Iranian opposition activists – the very people working to remove supreme leader Ayatollah Ali Khamenei from power.

Coup

British spies have targeted Iran for decades, driven by commercial profit and regional control.

In 1951, when the country’s secular prime minister, Mohammed Mosaddeq, nationalised the British Anglo-Iranian Oil Company (later known as BP), the British ambassador wrote: “It is so important to prevent the Persians from destroying their main source of revenue … by trying to run it themselves.”

Two years later, the U.K. and U.S. secretly backed a coup to oust Mosaddeq and centralise power under a repressive “pro-Western” regime. 

Declassified files have since revealed the central role played by MI6, which recruited agents and bribed members of Iran’s Parliament. In doing so, one former spy claimed they spent “well over a million and a half pounds”. 

The U.K. and U.S. then supported Iran’s dictator, the shah, for the next 25 years

By 1979, the Iranian Revolution saw the establishment of the Islamic Republic led by another dictator, Ayatollah Khomeini. But this did not stop British spies from collaborating with the regime when it was in their interests.

For instance, in 1983, British intelligence provided Khomeini with a list of Iranians allegedly working for the Soviet Union. The intelligence was used to round up over 1,000 communists, as many as 200 of whom were executed. Meanwhile Iran’s communist party, the Tudeh, was banned and forced underground. 

Secret relations were again exploited in the early 1990s, when MI6 helped supply Iran with materials to make chemical weapons — despite its own ban on such sales. 

Britain’s aim was supposedly to use the deals as a way to insert operatives into the Iranian government and gather intelligence about its weapons programmes.

Keep reading

Spying on Iran: How MI6 infiltrated the IAEA

Leaked confidential files indicate the International Atomic Energy Agency was infiltrated by a veteran British spy who has claimed credit for sanctions on Iran. The documents lend weight to the Islamic Republic’s accusation that the nuclear watchdog secretly colluded with its enemies.

A notorious British MI6 agent infiltrated the International Atomic Energy Agency (IAEA) on London’s behalf, according to leaked documents reviewed by The Grayzone. The agent, Nicholas Langman, is a veteran intelligence operative who claims credit for helping engineer the West’s economic war on Iran.

Langman’s identity first surfaced in journalistic accounts of his role in deflecting accusations that British intelligence played a role in the death of Princess Diana. He was later accused by Greek authorities of overseeing the abduction and torture of Pakistani migrants in Athens.

In both cases, UK authorities issued censorship orders forbidding the press from publishing his name. But Greek media, which was under no such obligation, confirmed that Langman was one of the MI6 assets withdrawn from Britain’s embassy in Athens.

The Grayzone discovered the résumé of the journeyman British operative in a trove of leaked papers detailing the activities of Torchlight, a prolific British intelligence cutout. The bio of the longtime MI6 officer reveals he “led large, inter-agency teams to identify and defeat the spread of nuclear, chemical and biological weapons technology, including by innovative technical means and sanctions.” 

In particular, the MI6 agent says he “worked to prevent WMD proliferation through… support for the [IAEA] and Organization for the Prohibition of Chemical Weapons [OPCW] and through high level international partnerships.”

Langman’s CV credits him with playing a major role in organizing the sanctions regime on Iran by “[building] highly effective and mutually supportive relations across government and with senior US, European, Middle and Far Eastern colleagues for strategy” between 2010 and 2012. He boasts in his bio that this achievement “enabled [the] major diplomatic success of [the] Iranian nuclear and sanctions agreement.” 

Keep reading

House Republican Introduces Bill to Increase Penalties for Spies Working for US Adversaries

Rep. Pat Harrigan (R-N.C.) has introduced new legislation that would mandate harsher prison terms for those responsible for carrying out espionage for America’s top adversaries, namely China, Iran, North Korea, and Russia.

Harrigan, who serves on the House’s Armed Services and Science, Space and Technology committees, introduced the Foreign Adversary Federal Offense (FAFO) Act (HR 4081), which would set a minimum prison sentence of 15 years for defense-related espionage and at least 10 years in prison without parole for economic espionage.

Corporations or other organizations found guilty of economic espionage would face a fine of $20 million or five times the value of the stolen trade secret.

“My FAFO Act is a direct response to the growing threat posed by foreign adversaries targeting the United States from within,” Harrigan said in a statement on June 24. “When individuals steal defense secrets or compromise our critical infrastructure on behalf of China, Russia, Iran, or North Korea, they are committing an act of betrayal against this country.

“This legislation ensures they face severe, unrelenting consequences. There will be no plea deals, no light sentences, and no path to parole. If you betray America, you will face the full weight of American justice.”

According to the bill, the penalties would be specific to those advancing the interests of a “covered nation” under a U.S. law restricting the Department of Defense’s procurement of sensitive materials from a list of foreign countries, including China, Russia, Iran, and North Korea.

Keep reading

Shock Report: Iran Admits Israel Has Infiltrated the “Highest Offices” of Its Government – Even Counter-Espionage Units Are Filled with Israeli Agents

On Friday, Israel launched an aerial attack that decimated Iran’s military leadership and destroyed much of Iran’s nuclear and military capabilities.

This was a huge blow to Iran but not unexpected. The US had recalled several diplomats and officials across the MidEast earlier in the week in anticipation of an Israeli military strike on Iran.

In two days of aerial strikes Israel eliminated several of the top Iranian officials sleeping in their homes in Tehran.

Banafsheh Zand Bonazzi at Iran So Far Away posted a diagram of the top Iranian officials targeted and eliminated by the Israeli military.

The head of the Iranian Revolutionary Guard Corp (IRGC), the Commander of the Joint Staff of the Armed Forces, the Commander of the IRGC’s airspace, the Commander of the Khatam Al-Anbia Construction Headquarters, and others have been eliminated so far.

Israel announced that it was not against taking out the Supreme Leader Ayatollah Khamenei. This would immediately make the ayatollah a rallying cry for his devotees.

According to Iran Wire, the reason Israel is having such great success in their military strikes and strategy so far is because Iran’s “highest offices” have been infiltrated by Israeli agents.

Israel has had success infiltrating the Iranian regime thanks to the mass corruption of the officials.

Keep reading

New Evidence Suggests FBI Agent Involved With Crossfire Hurricane Was Foreign Spy

The U.S. Department of Justice has reopened a case against a former top FBI counterspy. Charles McGonigal was Special Agent in Charge of Counterintelligence at the New York field office. He left the FBI in 2018, joined the massive Brookfield asset management fund as a vice president for global security, and was arrested and convicted in 2023. 

But not for espionage. McGonigal quickly pled guilty to corruption-related crimes. He is serving six-and-a-half years in federal prison. 

His prosecution and admission seem suspiciously tidy.

McGonigal was part of the FBI’s discredited CROSSFIRE HURRICANE “counterintelligence” operation led by his boss, Peter Strzok, against Donald Trump and his supporters in 2016.

As the former senior spy-hunter at the Bureau’s largest field office, McGonigal barely defended himself from charges relating to illegally accepting money from Albanian businessmen tied to that tiny country’s intelligence service, and for ties to a sanctioned Russian oligarch.

He received a light sentence and $40,000 fine.

Something feels off. To the Russian or Chinese intelligence services, someone in McGonigal’s position would be a prime intelligence mark — the man in charge of tracking them. 

Someone with his double life and excessive lifestyle makes a ripe target. It stretches credulity to think that Albanian intelligence got to McGonigal instead of Putin’s chekists.

Keep reading