Ex-Google Engineer Convicted for Economic Espionage in China AI Secrets Case

Ex-Google Engineer Convicted of Stealing AI Secrets for China’s Benefit

In a landmark case underscoring the critical importance of safeguarding intellectual property, a federal jury has convicted 38-year-old Linwei Ding, a former software engineer at Google, on multiple counts of economic espionage and theft of trade secrets. The conviction highlights the ongoing challenges faced by tech giants in protecting their proprietary technologies from foreign exploitation.

The Conviction and Its Implications

After an 11-day trial presided over by U.S. District Judge Vince Chhabria, the jury found Ding guilty on seven counts of economic espionage under 18 U.S.C. § 1831 and seven counts of theft of trade secrets under 18 U.S.C. § 1832. Each count of economic espionage carries a potential sentence of up to 15 years in prison, while each count of trade secret theft could result in up to 10 years of imprisonment. This case serves as a stark reminder of the severe legal consequences associated with the misappropriation of sensitive technological information.

Detailed Account of the Theft

Between May 2022 and April 2023, during his tenure at Google, Ding systematically accessed and exfiltrated over 2,000 pages of confidential documentation detailing Google’s advanced artificial intelligence (AI) infrastructure. He uploaded these sensitive materials to a personal Google Cloud account under his control. In December 2023, shortly before his resignation from Google, Ding transferred the stolen trade secrets onto his personal computer, completing the illicit data extraction process.

Undisclosed Affiliations and Intentions

Investigations revealed that while employed at Google, Ding maintained undisclosed relationships with technology entities based in the People’s Republic of China (PRC). Around June 2022, he engaged in discussions to assume the role of Chief Technology Officer for an early-stage PRC technology company. By early 2023, Ding had founded his own AI and machine learning startup in China, positioning himself as its CEO. In presentations to potential investors, Ding explicitly stated his capability to rapidly develop an AI supercomputer by replicating and modifying Google’s proprietary technology, directly referencing the stolen architectural specifications.

Alignment with PRC Government Objectives

Evidence presented during the trial demonstrated that Ding’s actions were strategically aligned with the objectives of the PRC government. In late 2023, he applied for Shanghai’s government-sponsored talent recruitment program, expressing his intention to help China achieve computing power infrastructure capabilities on par with international levels. The stolen materials targeted seven specific categories of critical AI infrastructure, including hardware, software platforms, custom chip designs, and high-speed communication systems, all essential components for training advanced AI models.

National Security Concerns and Prosecutorial Response

Prosecutors emphasized that Ding’s actions posed a significant threat to American technological competitiveness and national security by transferring cutting-edge AI infrastructure knowledge to entities controlled by the Chinese government. United States Attorney Craig H. Missakian stated that the conviction underscores the federal government’s commitment to protecting Silicon Valley’s intellectual capital from foreign espionage operations. This case highlights the ongoing risks associated with economic espionage and the importance of robust security measures within the tech industry.

Upcoming Legal Proceedings

Ding is scheduled for a status conference on February 3, 2026. Sentencing will follow, taking into consideration the U.S. Sentencing Guidelines and 18 U.S.C. § 3553. The outcome of this case is expected to have significant implications for the tech industry, particularly concerning the protection of trade secrets and the prevention of intellectual property theft.