Xiaodong Sheldon Meng (Quantum3D)

Meng was a 44 year-old software engineer living in Cupertino, California when, in 2008, he became the first person sentenced for a violation of the U.S.’s Economic Epionage Act of 1996. Meng had worked as an engineer for Quantum3D, a defense contractor that makes visual simulation software used for military training and other purposes. According to the U.S. Department of Justice, Meng engaged in widespread spying on behalf of The People’s Republic of China between 2002 and 2006: obtaining the source code for software known as Mantis, used by the U.S.

Meng was a 44 year-old software engineer living in Cupertino, California when, in 2008, he became the first person sentenced for a violation of the U.S.’s Economic Epionage Act of 1996. Meng had worked as an engineer for Quantum3D, a defense contractor that makes visual simulation software used for military training and other purposes. According to the U.S. Department of Justice, Meng engaged in widespread spying on behalf of The People’s Republic of China between 2002 and 2006: obtaining the source code for software known as Mantis, used by the U.S. military to simiulate real world motion for military training. Also stolen were DOD restricted technologies known as nVSensor and viXsen, which are used for tasks like simulating night vision training runs by military aircraft, and the source code for six other products, and more than one hundred materials and utilities belonging to Quantum3D. He was sentenced to 24 months in prison and a three year term of supervised release and fined $10,000.

Suggested articles

2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

Top Mobile Security Stories of 2019

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019.