Skip to main content

Chinese-American engineer charged with stealing GE technology

Washington (AFP) - A Chinese-American engineer faces charges of stealing valuable technology from General Electric, sneaking it out hidden in a picture of the sunset to take to China, the US Justice Department said.
Xiaoqing Zheng, 56, a US citizen also believed to have Chinese nationality, was due to appear before a judge in Albany, New York on Thursday, a day after his arrest, according to federal prosecutors.
Following a four-year investigation, the FBI arrested Xiaoqing Zheng after searching his home and finding, among other things, a handbook detailing "resources" Beijing would grant to individuals providing certain technologies.
Zheng's arrest comes as President Donald Trump intensifies the trade war with Beijing, largely over complaints the country steals US technology or obliges American companies to share know-how in exchange for doing business in China.
Trump imposed punishing tariffs on tens of billions in Chinese imports and plans more to ratchet up the pressure on Beijing to correct the pervasive industrial espionage.
US investigators believe Zheng may have begun stealing thousands of files containing GE's industrial secrets as far back as 2014, according to court documents.
And Zheng worked for or owned Chinese companies dealing in the same technologies produced by GE Power, which produces and markets energy generation techniques around the world, the FBI found.
"The GE proprietary technologies on which Zheng works would have economic value to any of GE's business competitors," FBI Special Agent MD McDonald said in an affidavit.
GE monitored Zheng as he allegedly transferred files containing turbine technology to his personal email account while hiding the data within the binary code of a digital photograph of a sunset, a process known as "steganography," according to McDonald.
Following a search of Zheng's home in Niskayuna, New York, FBI agents said they retrieved the reward handbook and a passport showing five trips to China in the past two years.
FBI agents questioned Zheng on Wednesday and say he acknowledged taking GE's proprietary information using steganography on around five to 10 occasions.
Charged with a single count of theft of trade secrets, Zheng faces a maximum of 10 years in prison and a fine of $250,000 as well as three years of supervised release, although punishments are frequently imposed at less than that.

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...