May 13, 2026
ex-google-engineers-bid-to-nix-conviction-nears-partial-win

A California federal judge signaled on Tuesday that he is considering a partial reversal of a jury’s decision to convict a former Google software engineer of trade secret theft and economic espionage, expressing notable skepticism regarding the specific charges of economic espionage. During a post-trial hearing in a San Francisco federal courtroom, U.S. District Judge James Donato indicated that while the evidence for trade secret theft appeared robust, the prosecution may have failed to sufficiently demonstrate that the defendant intended to benefit the Chinese government—a critical legal threshold required for an economic espionage conviction under federal law.

The defendant, Linwei Ding, a Chinese national also known as Leon Ding, was indicted in early 2024 and subsequently convicted by a jury on multiple counts related to the misappropriation of proprietary information concerning Google’s advanced artificial intelligence (AI) data center hardware and software. However, the latest developments suggest a potential shift in the legal outcome, as the court weighs whether the government’s evidence bridged the gap between private commercial theft and state-sponsored espionage.

The Core of the Legal Challenge

The primary point of contention in Tuesday’s hearing revolved around the distinction between 18 U.S.C. § 1832, which covers the theft of trade secrets for commercial or economic purposes, and 18 U.S.C. § 1831, which specifically addresses economic espionage intended to benefit a foreign government or an agent of a foreign power.

Judge Donato remarked that he was "somewhat skeptical" of the economic espionage counts, noting that the trial record did not clearly establish a direct link between Ding’s actions and the Chinese state. While the prosecution argued that the entities Ding allegedly collaborated with were inherently tied to Chinese national interests, the judge questioned whether "intent to benefit a foreign government" could be inferred solely from the defendant’s interactions with private or semi-private Chinese technology firms.

Legal experts suggest that if the judge vacates the economic espionage convictions, it would represent a significant setback for the Department of Justice’s (DOJ) efforts to use the Economic Espionage Act as a broad tool against intellectual property theft involving Chinese entities. However, Ding still faces the likelihood of maintaining convictions on the lesser trade secret theft charges, which still carry substantial prison sentences and fines.

Background and Chronology of the Case

The case against Linwei Ding began to take shape in early 2022, though his employment at Google dated back to 2019. Ding worked as a software engineer within Google’s cloud division, where he had access to some of the company’s most sensitive hardware specifications and software orchestration layers.

According to the indictment and trial testimony, the timeline of the alleged misconduct is as follows:

  • 2019: Linwei Ding is hired by Google to work on the development of Tensor Processing Units (TPUs), the proprietary chips that power Google’s most advanced AI workloads.
  • May 2022: Ding begins secretly uploading confidential information from Google’s network to a personal Google Cloud account. To bypass data loss prevention (DLP) systems, he allegedly copied data from Google source files into the Apple Notes application on his Google-issued MacBook, then converted those notes into PDFs to upload to his personal account.
  • June 2022: Ding is approached by the CEO of a China-based startup focused on AI technology. Shortly thereafter, he is offered a Chief Technology Officer (CTO) position at another Chinese startup, which he accepts without informing Google.
  • Late 2022 – 2023: While still employed at Google, Ding allegedly travels to China to raise capital for his own startup, which he named "Zhisuan." He reportedly pitched the company to Chinese investors by highlighting his experience and access to Google’s TPU technology.
  • December 2023: Ding resigns from Google. Shortly after his departure, Google’s security teams discover the unauthorized uploads and alert the Federal Bureau of Investigation (FBI).
  • March 2024: The DOJ officially announces the indictment of Ding on four counts of theft of trade secrets.
  • 2025 – early 2026: The case proceeds to trial, resulting in a jury verdict of guilty on all counts, including economic espionage.

Technical Significance of the Stolen Data

The information Ding was convicted of stealing is central to the global AI arms race. The trade secrets involved Google’s TPU v4 and v6 architectures. TPUs are specialized integrated circuits (ASICs) designed specifically for machine learning. Unlike general-purpose GPUs (Graphics Processing Units), TPUs are optimized for the high-volume tensor operations required by large language models (LLMs) like Google’s Gemini and OpenAI’s GPT series.

The stolen data included:

  1. Chip Architecture: Detailed schematics of the TPU hardware design.
  2. CMS (Cluster Management System): The software orchestration layer that allows thousands of TPUs to work in unison as a single supercomputer.
  3. Hardware Specifications: Performance metrics and thermal management data critical for manufacturing competitive AI hardware.

The value of this intellectual property is estimated in the billions of dollars. For a competing entity or a foreign nation, obtaining these secrets could truncate years of research and development, providing a shortcut to achieving parity with U.S. semiconductor and AI capabilities.

Arguments from the Defense and Prosecution

During Tuesday’s hearing, Ding’s defense counsel argued that the government’s case for economic espionage relied on "conjecture and geopolitical atmosphere" rather than concrete evidence of state involvement. They contended that Ding was a motivated entrepreneur looking to start his own business, not a spy operating on behalf of the Chinese Communist Party (CCP).

"The government is attempting to transform a standard trade secret case into a national security crisis," the defense stated. "There is no evidence that Mr. Ding received instructions from a foreign official, nor that he intended for the stolen files to end up in the hands of the Chinese government."

The prosecution countered by pointing to the various subsidies and "talent programs" Ding applied for in China. They argued that in the context of the Chinese economy, the line between private AI startups and state interests is non-existent. They cited China’s "Military-Civil Fusion" policy as evidence that any advancement in AI technology provided to a Chinese firm inherently benefits the state’s military and strategic goals.

"Mr. Ding did not just steal data; he marketed that data to entities that operate under the direct oversight and for the strategic benefit of the People’s Republic of China," the Assistant U.S. Attorney argued.

Supporting Data and Broader Context

The Ding case is part of a larger trend of increased scrutiny by the DOJ’s Disruptive Technology Strike Force, a joint initiative between the Justice and Commerce Departments. Since its inception, the strike force has ramped up investigations into the illegal transfer of sensitive technologies to adversarial nations, including China, Russia, and Iran.

According to data from the FBI, investigations into Chinese economic espionage have increased by over 1,300% in the last decade. However, the success rate of these cases in court has been mixed. The now-defunct "China Initiative" faced criticism for perceived overreach and racial profiling, leading to its rebranding. The Ding case is seen as a test of whether the DOJ can successfully prosecute such cases under more traditional legal frameworks without the baggage of previous controversial programs.

Furthermore, a 2023 report by the Commission on the Theft of American Intellectual Property estimated that IP theft costs the U.S. economy between $225 billion and $600 billion annually, with China being the primary beneficiary of such activities.

Potential Implications of a Partial Win

If Judge Donato proceeds to "nix" the economic espionage convictions, it will set a significant precedent for future cases involving dual-national engineers and the tech industry. It would signal that the judiciary requires a high "burden of proof" to link commercial theft to state-sponsored espionage, potentially making it harder for the government to secure the harshest penalties available under the law.

For Google and other Silicon Valley giants, a partial win for Ding would underscore the limitations of the legal system in fully punishing IP theft that blurs the lines between private enterprise and state interest. It may lead to even more stringent internal security protocols, such as:

  • Increased restrictions on "bring your own device" (BYOD) policies for engineers working on sensitive hardware.
  • Enhanced AI-driven monitoring of data exfiltration patterns.
  • Greater scrutiny of employees’ outside business interests and foreign travel.

Official Responses and Reactions

While Google has not released a detailed statement following Tuesday’s hearing, a spokesperson previously stated that the company has "rigorous safeguards to prevent the theft of our confidential commercial information and trade secrets" and that they would continue to cooperate with law enforcement to protect their intellectual property.

The Chinese Ministry of Foreign Affairs has historically denied all allegations of state-sponsored IP theft, frequently characterizing U.S. prosecutions of Chinese nationals as "political manipulation" and "technological bullying."

Legal analysts believe that even if Ding wins this partial victory, he remains in a precarious position. "A partial win is still a conviction," said one former federal prosecutor not involved in the case. "The trade secret theft charges alone carry a maximum of 10 years per count. Even if the judge drops the espionage charges, the defendant is still looking at significant time in federal prison and likely deportation upon release."

Conclusion and Next Steps

The hearing concluded with Judge Donato taking the matter under advisement. A written ruling is expected in the coming weeks. The outcome will determine whether Ding will be sentenced for the more severe crime of economic espionage or if his legal culpability will be limited to the theft of trade secrets for private gain.

Regardless of the final ruling, the case serves as a stark reminder of the vulnerabilities inherent in the global tech talent pool and the ongoing challenges the U.S. legal system faces in defining the boundaries of espionage in an era of interconnected economies and rapid technological advancement. The tech industry and international observers alike will be watching closely as the court decides how to balance the protection of national security with the strict evidentiary requirements of the law.

Leave a Reply

Your email address will not be published. Required fields are marked *