Former Google software engineer Linwei Ding, 38, was found guilty by a federal jury of economic espionage and trade secret theft. Ding's systematic theft of more than 2,000 pages of private Google AI technology documentation meant to help the People's Republic of China (PRC) is the basis for the conviction. Following an 11-day trial before U.S. District Judge Vince Chhabria, the jury found Ding guilty on seven counts of economic espionage under 18 U.S.C.
§ 1831 and seven counts of theft of trade secrets under 18 U.S.C. § 1832. Trade secret theft convictions carry a maximum sentence of 10 years per count, while economic espionage counts carry a maximum sentence of 15 years.
Theft Timeline and Methodology Ding gained access to Google's network between May 2022 and April 2023 while working there, and he stole private documents that described Google's cutting-edge AI infrastructure. He controlled a personal Google Cloud account where he uploaded the pilfered materials. Google's unique Tensor Processing Unit (TPU) chip architecture, Graphics Processing Unit (GPU) systems integration, SmartNIC network interface card specifications, and proprietary software coordinating supercomputer operations for large language model training were among the compromised trade secrets.
The data exfiltration was completed when Ding downloaded the stolen trade secrets onto his personal computer in December 2023, a few weeks prior to his resignation from Google. While employed by Google, Ding maintained undisclosed relationships with PRC-based technology entities.
He started talks to become the Chief Technology Officer of an early-stage PRC technology company around June 2022. By early 2023, Ding was serving as CEO of his own AI and machine learning startup in the PRC. Referencing stolen architectural specifications, Ding made it clear in investor presentations that he could quickly create an AI supercomputer by copying and altering Google's proprietary technology.
Ding's strategic alignment with PRC government objectives was demonstrated by evidence presented during the trial.
With the goal of "helping China achieve computing power infrastructure capabilities on par with international levels," Ding submitted an application for Shanghai's government-sponsored talent recruitment program towards the end of 2023. His stolen materials targeted seven specific categories of critical AI infrastructure technology: hardware, software platforms, custom chip designs, and high-speed communication systems essential for training advanced AI models. Prosecutors emphasized that Ding’s actions threatened American technological competitiveness and national security by transferring cutting-edge AI infrastructure knowledge to entities controlled by the Chinese government.
According to US Attorney Craig H. Missakian, the conviction shows the federal government's dedication to safeguarding Silicon Valley's intellectual property against foreign espionage activities. On February 3, 2026, Ding will hold a status conference. Sentencing will take into account both 18 U.S.C. and the U.S.
Sentencing Guidelines.
Section 3553.


%2520(1).webp&w=3840&q=75)









.webp%3Fw%3D1068%26resize%3D1068%2C0%26ssl%3D1&w=3840&q=75)