DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Chinese National Charged with Destroying Hard Drive During FBI Investigation into the Possible Transfer of Sensitive Software to China

Posted on August 29, 2020 by Dissent

From the U.S. Department of Justice:

A Chinese national and researcher at the University of California, Los Angeles has been arrested on federal charges of destroying evidence to obstruct an FBI investigation after he was observed throwing a damaged hard drive into a dumpster outside his apartment, the Justice Department announced today.

Guan Lei, 29, of Alhambra, was arrested pursuant to a one-count criminal complaint unsealed this afternoon during his initial appearance in United States District Court.

The criminal complaint alleges that Guan, who was in the U.S. on a J-1 non-immigrant visa, threw a damaged hard drive into a trash dumpster near his residence on July 25.  The FBI recovered the damaged hard drive after Guan was not allowed to board a flight to China and after Guan refused the FBI’s request to examine his computer.  The affidavit in support of the complaint notes that the internal hard drive “was irreparably damaged and that all previous data associated with the hard drive appears to have been removed deliberately and by force.”

According to the complaint, Guan is being investigated for possibly transferring sensitive U.S. software or technical data to China’s National University of Defense Technology (NUDT) and falsely denying his association with the Chinese military – the People’s Liberation Army – in connection with his 2018 visa application and in interviews with federal law enforcement. Guan later admitted that he had participated in military training and wore military uniforms while at NUDT.  One of Guan’s NUDT faculty advisors in China was also a lieutenant general in the PLA who developed computers used by the PLA General Staff Department, the PLA General Armament Department, Air Force, military weather forecasts, and nuclear technology.  NUDT is “suspected of procuring U.S.-origin items to develop supercomputers with nuclear explosive applications” and has been placed on the Department of Commerce’s Entity List for nuclear nonproliferation reasons, according to the affidavit.

In addition to destroying the hard drive, the complaint alleges that Guan concealed digital storage devices from investigators and falsely told federal officials that he had not had any contact with the Chinese consulate during his nearly two-year stay in the U.S.

During his initial appearance this afternoon, Guan was ordered detained by a United States Magistrate Judge, who scheduled an arraignment for Sept. 17, 2020 .

A criminal complaint contains allegations that a defendant has committed a crime. Every defendant is presumed innocent until and unless proven guilty beyond a reasonable doubt.

The felony offense of destruction of evidence carries a statutory maximum sentence of 20 years in federal prison.

This case is being investigated by the FBI, Homeland Security Investigations, and U.S. Customs and Border Protection. The U.S. Department of State’s Diplomatic Security Service has provided substantial assistance during the investigation.

This case is being prosecuted by Assistant U.S. Attorneys Will Rollins and George Pence of the Terrorism and Export Crimes Section.

 

Category: Uncategorized

Post navigation

← More Ransomware Gangs Threaten Victims With Data Leaking
Former Chief Security Officer For Uber Charged With Obstruction Of Justice →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • International cybercrime tackled: Amsterdam police and FBI dismantle proxy service Anyproxy
  • Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
  • N.W.T.’s medical record system under the microscope after 2 reported cases of snooping
  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • FTC dismisses privacy concerns in Google breakup
  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.