An American citizen will spend the next four or so years behind bars in the US for smuggling corporate secrets out of the states to his spymasters in China.
A federal district judge this week sentenced Xuehua Edward Peng, 56, of Hayward, California, after he admitted handing over the trade secrets to Beijing. Peng earlier confessed that SD cards loaded with information stolen from an unspecified US company were left for him to collect at hotels by a contact only known as Ed. Peng would also hide tens of thousands of dollars in hotel rooms for Ed to collect as payment. Lawyers said Peng spent years trafficking confidential info.
"Today Xuehua Peng suffers the consequences of acting in the United States at the direction of a foreign government,” said US attorney David Anderson.
"This day of reckoning comes from Peng’s decision to execute dead drops, deliver payments, and personally carry to Beijing, China, secure digital cards containing classified information related to the national security of the United States. Peng will now spend years in prison for compromising the security of the United States."
Months-long trial of alleged CIA Vault 7 exploit leaker ends with hung jury: Ex-sysadmin guilty of contempt, lying to FBIREAD MORE
Prosecution paperwork [PDF] stated that, from 2015 through 2019, Peng agreed to, under orders from the Chinese Ministry of State Security, collect SD cards filled with stolen corporate information, and fly to China to drop them off to government snoops. The nature of the data was seemingly too sensitive for the US government to disclose in court.
Uncle Sam's investigators said Peng moved to the Land of the Free under a B-1 business visa at the turn of the millennium, armed with a degree in mechanical engineering and "training in traditional Chinese medicine." We're told "he became a permanent resident via marriage in 2006, and was working as a San Francisco tour guide during his nefarious activities."
According to prosecutors, three years after his US naturalization in 2012, Peng began moving information from the US to China via hotel pickups after he was tapped up by a Beijing official. Here's how it went down, we're told:
On October 24, 2015, Peng goes to the hotel [in Newark, California] and retrieves a package that was left for him there. The package contains a secure digital (SD) memory card. The next day, Peng drives to San Francisco International Airport and flies directly to Beijing, China. In Beijing, Peng meets with agents of the Ministry of State Security (MSS), including the People's Republic of China (PRC) official with whom Peng had been communicating, and delivers the SD card to MSS.
A PRC official uses coded language to tell Peng that another dead drop will occur on April 23, 2016. The official directs Peng to book a hotel room where he will conduct the exchange. The PRC official directed Peng to leave $20,000 cash in the hotel room and that Peng be will be reimbursed for the payment. The PRC official instructs Peng to return to the PRC on April 24, and to fly directly to Beijing, Shanghai, or Guangdong. Peng is informed that the PRC official with whom he is communicating would meet Peng when he landed.
Peng complied with the instructions. On April 23, 2016, Peng drives to an Oakland hotel, reserves a room, and leaves a key to the room at the front desk. Peng leaves $20,000 concealed on the underside of a dresser in the room. Hours later, Peng returns, observes that the money had been retrieved and determines that a cigarette pack with an SD card inside of it has been left for him in place of the money. Peng travels on a direct flight from San Francisco to Beijing the next day where he meets with agents of the MSS, including the PRC official.
Rinse and repeat a few more times. At one point, we're told, Peng taped $20,000 to the underside of a dresser in a hotel room and left a key to his room at the front desk for someone to collect. Returning to the hotel about 90 minutes later, Peng saw the money was taken, checked out of the hotel, and returned home.
Peng was cuffed at his home on September 27, 2019 before his seventh dead drop could be completed. We're told the US government found out about the espionage after a contact informed on Peng for around $200,000 in reward money, and he was put under FBI surveillance.
"This case exposed one of the ways that Chinese intelligence officers work to collect classified information from the United States without having to step foot in this country," said Assistant Attorney General Demers. "Peng acted as an agent of the Chinese Ministry of State Security in the United States, conducting numerous dead drops here on their behalf and delivering classified information to them in China." ®