1-800-270-9034

Google Engineer Stealing AI Secrets

The U.S. Department Of Justice announced this week an indictment against an engineer who stole Google’s intellectual property (IP).

The U.S. Department Of Justice announced this week an indictment against an engineer who stole Google’s intellectual property (IP) while he worked at the company. During his employment he traveled to China to meet with two companies by which he was also employed.

The IP included information on cutting-edge technology that allows chips to work as a supercomputer for machine learning and AI. It also included information on GPUs, TPUs, and the software that allows these chips to communicate together.

This follows news from earlier in the week that North Korea had been found to have hacked two companies in South Korea that are involved in the production of semiconductors and work with the US. North Korea had been able to access IP on the production of these chips.

There is significant attention on the semiconductor industry currently as the US and China both compete to develop AI and quantum computing capabilities.

Insider theft is relatively uncommon, compared to ransomware attacks. It is also often accidental rather than malicious. However, a study by insider theft company, DTex Systems, found that up to 12% of employees take data when leaving a company. While taking any company data can have an impact on that organization, the theft of IP can be most significant. Companies involved in AI, quantum computing, and semiconductor development are of particularly high value right now.

While likely to be unrelated, DTex Systems announced a $50 million investment this week from CapitalG Management, a growth fund owned by Alphabet, Google’s parent company.

Considerations:

    • Insuring companies with IP in these high-value areas of technology should involve extra consideration for insider theft protection
    • Consider training for employees on insider threat and establish a reporting process for suspicious behavior
    • Implement a strong IDAM program to ensure employees only have access to information required for their role
    • Consider monitoring software to detect anomalous behavior

Share the Article

Recent Articles

New SIM Swapping Attacks

According to new research, eSIM cards are being hijacked for cyber attacks. eSIM cards are remotely programmable chips that are stored within phones and other wearable devices.

Read More »
Scroll to Top

This website uses cookies to improve your browsing experience. By clicking accept, you consent to the use of cookies. To learn more about the cookies we use, visit our Privacy & Cookie Policy.

Certifications and Credentials

  • AWS Certified Solutions Architect – Associate
  • AWS Cloud Practitioner
  • Cellebrite and Paraben Certified Mobile Examiner
  • Cellebrite Certified Mobile Examiner (CCME)
  • Cellebrite Certified Physical Analyst and Certified Operator
  • Certified Access Data Forensic Analyst
  • Certified E-Discovery Specialist (ACEDS)
  • Certified Forensic Computer Examiner (CFCE)
  • Certified Forensic Examiner-Access Data (ACE)
  • Certified Hard Drive Repair Technician
  • Certified in SANS Windows Forensic Analysis (GCFE)
  • Certified Information Security Manager (Certified by ISACA)
  • Certified Information Systems Security Professional (CISSP)
  • Certified Mac Forensics Analyst
  • Certified Public Accountant
  • Chief Information Security Officer (Certified by EC-Council)
  • Citrix Certified Integration Architect
  • CompTIA A+
  • AWS CompTIA Cybersecurity Analyst (CySA+)
  • CompTIA Linux+
  • CompTIA Linux+ / Linux Professional Institute Certified Linux Administrator (LPIC-1)
  • CompTIA Pentest+
  • CompTIA Cloud+
  • CompTIA Security+
  • Cyber Forensics and Incident Response certificate – Carnegie Mellon
  • Department of Defense Cyber Investigations Training Academy, Computer Forensic Examiner
  • EC-Council Computer Hacking Forensic Investigator Certification (CHFI)
  • EC-Council Computer Hacking Forensic Investigator Certification (CHFI)
  • EnCase Certified Examiner (EnCE)
  • FBI Certified Crisis Management Coordinator
  • GIAC Certified Forensic Analyst (GCFA)
  • GIAC Certified Forensic Examiner (GCFE)
  • GIAC Advanced Smartphone Forensics (GASF)
  • GIAC Information Security Fundamentals
  • GIAC Security Essentials (GSEC)
  • International Association of Computer Investigation Specialists (IACIS)
  • Licensed Member, California Bar Association
  • Magnet Certified Forensics Examiner (MCFE)
  • Microsoft Certified Professional (MCP)
  • Microsoft Certified Systems Engineer
  • Professional – Information Systems Security Architecture Professional (CISSP-ISSAP)
  • Professional – Information Systems Security Management Professional (CISSP-ISSMP)
  • Senior Professional Human Resources Certification
  • VMware Certified Professional

Report a New Incident

Your incident report has been submitted.