After former Google software engineer Linwei Ding stole thousands of pages of confidential trade secret information related to Google’s AI supercomputing infrastructure from the company, and attempted to transfer it to entities in the People’s Republic of China, his scheme ultimately unraveled in federal court.
On January 29th, 2026, a federal jury in San Francisco found Ding guilty of seven counts of economic espionage and seven counts of theft of trade secrets. Following an eleven-day trial, the case resulted in the first-ever conviction for AI-related economic espionage charges, marking a turning point in how artificial intelligence technologies will be protected and enforced under federal trade secret law moving forward.
How was a single engineer at one of the world’s largest tech companies able to carry out such a breach without immediate detection? Over the course of a year, Ding stole more than 2,000 pages containing detailed information about Google’s AI systems, custom chips, and specialized high-speed networking interface technology. He then copied those pages to his personal Google Cloud account while simultaneously working to found his own technology company in China and affiliating with a Chinese technology firm. Ding now faces a potential sentence of up to fifteen years in prison for each instance of economic espionage, alongside an additional ten years for every charge related to stealing trade secrets.
What does this mean for the future of AI development and governance? This case demonstrates the growing threat posed by insiders who exploit trusted access to circumvent traditional cybersecurity defenses. Unlike external hackers, insiders operate within the security perimeter, using legitimate credentials and authorized access. Prosecutors on the case emphasized that these stolen trade secrets could allow a competitor to bypass years of significant research and development efforts, thereby accelerating competitive parity and posing serious national security risks.
For the AI industry, the implications are immediate, as companies become more aware of the possibility of insider threats. They are likely to increase investments in internal monitoring, access controls, and governance structures. Insider threat defense programs may become standard practice, particularly as firms seek to align with Department of Justice policies that encourage proactive self-reporting and strong compliance programs. However, these enhanced compliance measures will also likely raise operational costs, as companies invest more heavily to protect some of their most valuable assets—trade secrets. This stems from the fact that trade secrets can protect secret information indefinitely, allowing these companies to maintain their competitive edge.
However, these costs may not remain internal. Increased spending on compliance and infrastructure protection to protect programming could translate into price increases or limited access tiers for consumers and businesses using these AI tools. This may also reinforce the dominance of large technology companies in the industry, as smaller companies lose out on opportunities due to funding struggles. Moreover, if AI infrastructure becomes increasingly framed as a matter of national security, firms may grow less transparent about their system designs and development practices.
Ultimately, the long-term effects of stronger trade secret enforcement are likely to safeguard national security and protect innovation incentives. However, this also risks reducing openness and transparency by companies, raising costs for both companies and consumers, and slowing global collaboration as firms and researchers become more cautious about information sharing in an era of heightened inside scrutiny.