Ex-Google Engineers Charged with High-Tech Secrets Extraction and Espionage
Three Former Silicon Valley Engineers Indicted for Trade Secret Theft
Three former Silicon Valley engineers have been indicted on charges related to a scheme to steal sensitive trade secrets from Google and other prominent technology companies.
Allegations of Conspiracy and Theft
The indictment, handed down by a federal grand jury, alleges that the three defendants conspired to commit trade secret theft, stole and attempted to steal trade secrets, and obstructed justice.
They allegedly removed documents containing trade secrets from Google and other companies and transferred them to unauthorized third-party locations, including work devices and personal contacts in Iran.
Concealment and Deception
To conceal their activities, the defendants submitted false affidavits to the technology companies regarding their conduct and the stolen trade secrets.
They also deleted exfiltrated files and related records from electronic devices and used methods to remove data that were designed to evade detection.
Defendants and Charges
The defendants, who are sisters Samaneh and Soroor Ghandali and Mohammad Khosravi, worked at various technology companies that develop mobile computer processors.
The Ghandali sisters previously worked at Google before moving to another technology company, while Khosravi, who is married to Samaneh Ghandali, worked at a separate technology company in the same field.
Each of the defendants faces up to 10 years in prison if convicted.
Implications and Importance
The indictment highlights the ongoing threat of insider threats and the importance of protecting sensitive information from unauthorized access.
The methods used by the defendants to steal trade secrets were sophisticated and involved the use of third-party communications platforms to capture data without transferring complete files.
They also manually photographed screens displaying document contents to obtain sensitive information.
The indictment is a significant development in the ongoing efforts to combat cyber espionage and protect sensitive information from theft.
It highlights the need for technology companies to implement robust security measures to prevent insider threats and protect their intellectual property.
