The U.S. Department of Justice (DoJ) has indicted a 38-year-old Chinese national and a California resident for allegedly stealing proprietary information from Google while covertly working for two tech firms based in China. The indictment highlights a significant cybersecurity breach involving sensitive data theft pertinent to artificial intelligence.
Linwei Ding, also known as Leon Ding, a former software engineer at Google, was arrested on March 6, 2024. According to the DoJ, he transferred sensitive trade secrets and other confidential information from Google’s network to his personal account while maintaining undisclosed affiliations with PRC-based companies engaged in AI development.
The indictment alleges that Ding pilfered over 500 confidential files containing critical AI trade secrets, intending to share this information with two unnamed Chinese firms seeking to strengthen their positions in the competitive AI landscape. U.S. Attorney Ismail Ramsey emphasized that while employed at Google, Ding actively sought to benefit both himself and his affiliated companies.
Between May 21, 2022, and May 2, 2023, Ding is accused of stealing proprietary information related to Google’s supercomputing data center infrastructure, vital for running AI models, as well as related management software. This endeavor involved significant manipulation, as Ding allegedly copied data into the Apple Notes app on his work-issued MacBook and then converted it into PDF files for upload to his Google account, circumventing standard security protocols.
Furthermore, Ding’s covert activities extended to allowing another Google employee to use his access badge to create the illusion of working within the U.S. office while he was actually present in China, leading to his resignation from Google on December 26, 2023.
With four counts of theft of trade secrets against him, Ding potentially faces a maximum of 10 years in prison and a fine of up to $250,000 for each count if convicted. The sophisticated nature of his breach suggests potential tactics aligned with the MITRE ATT&CK framework, particularly in initial access and data exfiltration techniques.
This incident occurred shortly after the DoJ’s indictment of David Franklin Slater, a civilian employee of the U.S. Air Force, for transmitting classified information regarding military operations on a foreign dating platform. Such breaches highlight a growing trend of insider threats and vulnerabilities within both private and governmental sectors, emphasizing the need for robust cybersecurity measures to safeguard sensitive information.
As incidents of data theft become increasingly common, business leaders must remain vigilant regarding the risks posed by insider threats and employ comprehensive security protocols. This situation serves as a pertinent reminder of the challenges faced in protecting proprietary information in an interconnected digital landscape.
In light of these developments, it is imperative for businesses—especially those in tech industries—to re-evaluate their cybersecurity protocols. The sophistication and implications of insider threats necessitate constant vigilance and adaptability in security strategies.