Google engineer convicted of stealing AI trade secrets for Chinese interests in landmark case

Reviewed byNidhi Govil

15 Sources

Share

A federal jury convicted former Google engineer Linwei Ding on 14 counts of economic espionage and theft of trade secrets. Between May 2022 and April 2023, he stole over 2,000 pages of confidential data about Google's AI infrastructure, including TPU and GPU specifications, while secretly founding AI startups in China. The case marks the first AI-related economic espionage conviction in U.S. history.

Google Engineer Found Guilty in First AI-Related Economic Espionage Case

A federal jury in San Francisco has convicted former Google engineer Linwei Ding on seven counts of economic espionage and seven counts of theft of trade secrets, marking the first conviction on AI-related economic espionage charges in U.S. history

5

. The 38-year-old software engineer, also known as Leon Ding, was found guilty of stealing more than 2,000 pages of confidential information about Google's AI infrastructure between May 2022 and April 2023 to benefit Chinese AI firms

3

. The verdict follows an 11-day trial that exposed what U.S. Assistant Attorney General John A. Eisenberg called "a calculated breach of trust involving some of the most advanced AI technology in the world at a critical moment in AI development"

1

.

Source: New York Post

Source: New York Post

Stealing GPU and TPU Trade Secrets Through Sophisticated Evasion

Ding, who joined Google in May 2019 and was responsible for developing software that helps Graphics Processing Units (GPUs) function more efficiently for machine learning applications, employed a calculated method to evade detection

2

. According to prosecutors, he copied data from Google source files into the Apple Notes application on his Google-issued MacBook, then converted those notes into PDF files before uploading thousands of them to his personal Google Cloud account

1

. This method helped him circumvent Google's network data loss prevention monitoring systems for approximately 11 months. The stolen material covered seven categories of AI trade secrets describing how Google designs, builds, and operates its data centers, including low-level specifications for Tensor Processing Units (TPUs), internal TPU instruction sets, and performance characteristics tied to high-bandwidth memory access and inter-chip connections

1

.

Source: Hacker News

Source: Hacker News

Secret Affiliations with Chinese Startups While at Google

While employed at Google, Ding maintained secret affiliations with two China-based technology companies and founded his own AI startup in China. In June 2022, he received a job offer as Chief Technology Officer at Beijing Rongshu Lianzhi Technology Co., Ltd., a machine learning acceleration startup, for 100,000 RMB per month (approximately $14,800 or $177,600 annually) plus bonuses and stock

2

. By May 2023, he had founded Shanghai Zhisuan Technology Co., Ltd., serving as CEO of a company focused on developing a Cluster Management System for accelerating machine learning workloads

4

. Evidence presented at trial showed that Ding told potential investors he could replicate Google's AI supercomputing infrastructure, with internal documents stating "we have experience with Google's ten-thousand-card computational power platform; we just need to replicate and upgrade it"

2

.

Deceptive Tactics and Government-Sponsored Ambitions

Ding traveled to China between October 2022 and March 2023 to participate in investor meetings for Rongshu, never informing Google about his affiliations or travels

3

. He even asked a colleague to periodically scan his entrance badge at Google's workplace to create the appearance he was still in the U.S. while actually working in China. Evidence showed Ding applied to a Shanghai government-sponsored talent program, stating he planned to "help China to have computing power infrastructure capabilities that are on par with the international level"

4

. His company Zhisuan was accepted into MiraclePlus, a China-based business incubation program, in November 2023, and internal memos indicated the company expected to market its technology to PRC-controlled entities, including government agencies and academic institutions

2

.

Source: The Register

Source: The Register

What the Stolen Google's AI Infrastructure Data Contained

The U.S. Justice Department detailed that the stolen material included comprehensive information about Google's AI supercomputing infrastructure. Beyond TPU specifications, Ding obtained documents describing TPU system architectures and the software stack used to schedule and manage work across clusters

1

. The theft also encompassed materials related to GPU machines and GPU cluster orchestration, focusing on how Google configures and operates multi-GPU systems at scale

1

. Additionally, he stole proprietary SmartNIC hardware and software specifications used for high-bandwidth, low-latency networking inside Google's AI clusters

4

.

Investigation Unravels After Public Presentation in China

Google's investigation began when Ding uploaded additional files to a second personal Google Drive account while in China. On December 8, 2023, he provided reassurance to a Google investigator and signed a Self-Deletion Affidavit claiming he hadn't retained any Google information, while concealing his prior use of a personal account

2

. The scheme unraveled when Google learned on December 29, 2023, that Ding had presented at the MiraclePlus conference as CEO of Zhisuan, just days after he had resigned from Google on December 26

4

. He had already booked a one-way ticket from San Francisco to Beijing scheduled for January 7, 2024. Company investigators immediately suspended his network access, remotely locked his Google laptop, and began reviewing security records.

Implications for AI Security and National Interests

Roman Rozhavsky, assistant director of the FBI's Counterintelligence and Espionage Division, stated that "Linwei Ding betrayed both the U.S. and his employer by stealing trade secrets about Google's AI technology on behalf of China's government"

5

. Ding faces a maximum sentence of 10 years in prison for each count of theft of trade secrets and 15 years for each economic espionage count, with sentencing yet to take place

4

. The conviction signals how seriously U.S. authorities now treat AI technologies as critical to economic and national security. Google's Lee-Anne Mulholland, VP of regulatory affairs, stated the verdict sends "a clear message that stealing trade secrets has serious consequences"

2

. The case emerges amid intensifying competition between U.S. and Chinese AI capabilities, with Google DeepMind CEO Demis Hassabis recently noting that Chinese AI models might be "a matter of months" behind Western capabilities

5

.

Today's Top Stories

TheOutpost.ai

Your Daily Dose of Curated AI News

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

© 2026 Triveous Technologies Private Limited
Instagram logo
LinkedIn logo