Friday, March 29, 2024

Electrical Engineer Faces Maximum 219 Years in Jail for Illegally Transport U.S Military Chips to China

An electrical engineer pleads guilty for Illegally Export electrical chips with Missile Guidance military Applications from U.S to China without the required export license.

Yi-Chi Shih, 64 found guilty on June 26 for violating the International Emergency Economic Powers Act, a U.S Federal law that regulates illegal and unauthorized exports.

A sentenced hearing scheduled by United States District Judge John A. Kronstadt, in result Shih faces a maximum sentence of 219 years in federal prison.

Shih also pleads guilty for other illegal activities including mail fraud, wire fraud, subscribing to a false tax return, making false statements to a government agency and conspiracy to gain unauthorized access.

Based on the evidence placed in a trial,  Shih and co-defendant Kiet Ahn Mai, 65 who resides in California collaborate with Shih and granted illegal access to the protected computer of a United States company that manufactured wide-band, high-power semiconductor chips.

Pieces of evidence also indicate that Shih defrauded the U.S. company out of its proprietary, export-controlled items, including its design services for MMICs and he access their computer via a web portal and stole the custom-designed MMICs.

The company that he illegally gained access produces a number of commercial and military applications and its customers include the Air Force, Navy and the Defense Advanced Research Projects Agency.

According to DOJ, “Especially These MMICs (monolithic microwave integrated circuits) are mainly used in missiles, missile guidance systems, fighter jets, electronic warfare, electronic warfare countermeasures and radar applications.”

The Department’s China Initiative is focused on preventing and prosecuting thefts of American technology and intellectual property for the benefit of China,”  “The defendant has been found guilty of conspiring to export sensitive semiconductor chips with military applications to China” said Assistant Attorney General Demers.

On January 2018, both were indicated with this case, Mai pleaded guilty in December 2018 and the court scheduled to be sentenced on September 19, at the time of sentence, he will face a maximum sentence of 10 years in federal prison.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Also Read: Hacker Sentenced 27 months in prison for Launching Massive DDoS Attacks on Sony and Gaming Networks

Website

Latest articles

Beware Of Weaponized Air Force invitation PDF Targeting Indian Defense And Energy Sectors

EclecticIQ cybersecurity researchers have uncovered a cyberespionage operation dubbed "Operation FlightNight" targeting Indian government...

WarzoneRAT Returns Post FBI Seizure: Utilizing LNK & HTA File

The notorious WarzoneRAT malware has made a comeback, despite the FBI's recent efforts to...

Google Revealed Kernel Address Sanitizer To Harden Android Firmware And Beyond

Android devices are popular among hackers due to the platform’s extensive acceptance and open-source...

Compromised SaaS Supply Chain Apps: 97% of Organizations at Risk of Cyber Attacks

Businesses increasingly rely on Software as a Service (SaaS) applications to drive efficiency, innovation,...

IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed...

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles