Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

February 8, 2026

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

February 8, 2026

Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists

February 8, 2026
Facebook X (Twitter) Instagram
Sunday, February 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

Team-CWDBy Team-CWDFebruary 7, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A former Google engineer accused of stealing thousands of the company’s confidential documents to build a startup in China has been convicted in the U.S., the Department of Justice (DoJ) announced Thursday.

Linwei Ding (aka Leon Ding), 38, was convicted by a federal jury on seven counts of economic espionage and seven counts of theft of trade secrets for taking over 2,000 documents containing the tech giant’s trade secrets related to artificial intelligence (AI) technology for the benefit of the People’s Republic of China (PRC).

“Silicon Valley is at the forefront of artificial intelligence innovation, pioneering transformative work that drives economic growth and strengthens our national security,” said U.S. Attorney Craig H. Missakian. “We will vigorously protect American intellectual capital from foreign interests that seek to gain an unfair competitive advantage while putting our national security at risk.”

Ding was indicted in March 2024 for transferring sensitive proprietary information from Google’s network to his personal Google Cloud account. The stolen documents included details about the company’s supercomputing data center infrastructure used for running AI models, the Cluster Management System (CMS) software for managing the data centers, and the AI models and applications they supported.

Specifically, the trade secrets pertained to –

  • Architecture and functionality of Google’s custom Tensor Processing Unit chips and systems, and Google’s Graphics Processing Unit systems
  • Software that allows the chips to communicate and execute tasks
  • Software that orchestrates thousands of chips into a supercomputer capable of training and executing cutting-edge AI workloads
  • Custom-designed SmartNIC, a type of network interface card used to facilitate high-speed communication within Google’s AI supercomputers and cloud networking products

The theft took place between May 2022 and April 2023. Ding, who joined Google in 2019, is said to have affiliated himself with two tech companies based in China, including a startup named Shanghai Zhisuan Technologies Co., which he founded in 2023, while he was employed by the firm. Ding downloaded the documents to his computer in December 2023, less than two weeks before resigning from Google.

“Around June 2022, Ding was in discussions to be the Chief Technology Officer for an early-stage technology company based in the PRC; by early 2023, Ding was in the process of founding his own technology company in the PRC focused on AI and machine learning and was acting as the company’s CEO,” the DoJ said.

The 2024 incident also alleged that the defendant took a number of deceitful steps to cover up the theft of trade secrets, including copying the data from Google source files into the Apple Notes application on his company-provided MacBook and then converting the notes to PDF files before uploading them to his Google account.

Furthermore, prosecutors accused Ding of asking another Google employee to use his company-issued access badge to scan into the entrance of a Google building, and give the impression that he was working from the office when, in fact, he was in China. The scheme unravelled in late 2023 when Google learned that he had given a public presentation in China to potential investors about his startup.

According to Courthouse News, Ding’s attorney Grant Fondo reportedly argued that Google did not do enough to protect the information, and that they could not have contained trade secrets because the documents in question were available to thousands of employees. “Google chose openness over security,” Fonda said.

In February 2025, Ding was charged with economic espionage, with the superseding indictment also claiming he applied to a Shanghai-based “talent” sponsored by Beijing. The indictment also called out these talent programs for encouraging individuals engaged in research and development outside the country to come to China to contribute to the nation’s economic and technological growth.

“Ding’s application for this talent plan stated that he planned to ‘help China to have computing power infrastructure capabilities that are on par with the international level,'” the DoJ said. “The evidence at trial also showed that Ding intended to benefit two entities controlled by the government of China by assisting with the development of an AI supercomputer and collaborating on the research and development of custom machine learning chips.”

Ding is scheduled to appear at a status conference on February 3, 2026. He faces a maximum sentence of 10 years in prison for each count of theft of trade secrets and 15 years in prison for each economic espionage count.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSubstack Confirms Data Breach, “Limited User Data” Compromised
Next Article Badges, Bytes and Blackmail
Team-CWD
  • Website

Related Posts

News

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

February 8, 2026
News

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

February 8, 2026
News

Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists

February 8, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Is it time for internet services to adopt identity verification?

January 14, 2026

Common Apple Pay scams, and how to stay safe

January 22, 2026

What parents should know to protect their children from doxxing

November 28, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.