Executive Summary

In January 2026, former Google software engineer Linwei Ding was convicted on multiple counts of economic espionage and theft of trade secrets. Between May 2022 and April 2023, Ding illicitly transferred over 2,000 pages of confidential AI-related documents from Google's network to his personal cloud account. These documents detailed Google's proprietary AI supercomputing infrastructure, including custom Tensor Processing Unit (TPU) and Graphics Processing Unit (GPU) technologies, orchestration software for large-scale AI workloads, and SmartNIC networking technology. Concurrently, Ding secretly affiliated with two China-based technology companies, assuming roles such as Chief Technology Officer and CEO, and aimed to replicate Google's AI supercomputing capabilities in China. (justice.gov)

This incident underscores the persistent threat of insider espionage within the tech industry, particularly concerning advanced AI technologies. It highlights the critical need for robust internal security measures and vigilant monitoring to protect intellectual property from unauthorized access and exfiltration.

Why This Matters Now

The conviction of Linwei Ding highlights the ongoing risks of insider threats in the tech industry, especially concerning AI advancements. As AI technologies become increasingly integral to national security and economic competitiveness, safeguarding intellectual property against espionage is more critical than ever.

Attack Path Analysis

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

Ding stole confidential information on Google's AI supercomputing infrastructure, including custom TPU and GPU technologies, orchestration software for large-scale AI workloads, and SmartNIC networking technology.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Aviatrix Zero Trust CNSF is pertinent to this incident as it could have constrained the attacker's ability to escalate privileges, move laterally, and exfiltrate data, thereby reducing the overall blast radius.

Initial Compromise

Control: Cloud Native Security Fabric (CNSF)

Mitigation: The attacker's initial access would likely remain unchanged due to legitimate credentials.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: The attacker's ability to escalate privileges could have been constrained, reducing access to sensitive information.

Lateral Movement

Control: East-West Traffic Security

Mitigation: The attacker's lateral movement would likely be restricted, limiting access to additional proprietary information.

Command & Control

Control: Multicloud Visibility & Control

Mitigation: The attacker's covert communication channels could have been detected and disrupted, hindering data exfiltration.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: The attacker's data exfiltration efforts would likely be blocked, preventing unauthorized data transfer.

Impact (Mitigations)

The overall impact of the incident would likely be reduced, preserving the organization's competitive edge.

Impact at a Glance

Affected Business Functions

  • Research and Development
  • Intellectual Property Management
  • Strategic Partnerships
Operational Disruption

Estimated downtime: N/A

Financial Impact

Estimated loss: N/A

Data Exposure

Confidential AI supercomputing infrastructure details, including proprietary TPU and GPU system technologies, orchestration software for large-scale AI workloads, and SmartNIC networking technology.

Recommended Actions

  • Implement Zero Trust Segmentation to enforce least privilege access and prevent unauthorized lateral movement within the network.
  • Deploy Multicloud Visibility & Control solutions to monitor and manage data flows across cloud environments, detecting anomalous activities.
  • Utilize Egress Security & Policy Enforcement to control and monitor outbound data transfers, preventing unauthorized data exfiltration.
  • Apply Threat Detection & Anomaly Response mechanisms to identify and respond to unusual behaviors indicative of insider threats.
  • Establish robust identity governance practices, including regular audits and monitoring of privileged accounts, to detect and prevent misuse.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image