The detention in Silicon Valley of three people linked to the technology industry once again puts on the table a problem that concerns both companies and governments: the theft of industrial secrets and the violation of intellectual property in a sector where the competitive advantage lies in knowledge. This week, the U.S. Department of Justice announced criminal charges against two engineers who worked on Google and against one of them's husband, accusing them of having extracted sensitive documentation from several employers and copying it in unauthorized locations, including Iran. You can check the case documents in the public file CourtListenar and read the official government statement on the website of the Department of Justice.
According to the allegations, the stolen parts were related to the design and safety of mobile processors, a strategic area for phone manufacturers and chip suppliers. Google, which internally identified the activity and cut off access, informed the authorities after detecting the anomalies; a company spokesman told the press that the data protection measures have been strengthened. On this version they reported specialized means such as Bloomberg.

The charges describe a pattern of conduct: employees who used their credentials to copy confidential files to external platforms and personal devices, coordination between them to transfer material between accounts and third party working devices, and the use of communication channels where, allegedly, folders with the personal names of those involved were labelled. When Google detected suspicious activity and revoked accesses, the prosecution claims that those involved tried to deny any leaks through signed statements and performed maneuvers to erase electronic traces. They are also charged with photographing screens with sensitive information rather than sending files directly, and travelling with material stored on personal devices that were then consulted from outside the United States.
The report of the Office of the Prosecutor includes online searches by the accused on how to delete communications and how long certain messages are kept by telephone providers, a detail that, if proven, would strengthen the hypothesis that there was an intention to hide evidence. If the case succeeds, each charge for misappropriation of business secrets carries decades of trial and considerable economic sanctions; the federal prosecution provides for prison sentences and substantial fines for each count, in addition to a separate charge for obstruction of justice that may lead to a higher penalty.
Beyond the human and judicial drama, the case illustrates a technical and organizational challenge facing large technology companies: how to reconcile the open collaboration needed for innovation with strict controls that prevent the unauthorized departure of critical materials. Organizations invest in access monitoring, permit segmentation, data exfiltration detection and compliance training, but internal attackers continue to find ways - sometimes simple, such as synchronizing files to external accounts or photographing screens - that require complementary controls and a corporate culture aimed at prevention.
There is also a geopolitical dimension. When allegations include the transfer of secrets to a country with diplomatic tensions with the United States, legal involvement and government response become more complex. The scrutiny of the chain of information custody, the traceability of devices and international cooperation to recover or block data is intensified, and companies must coordinate with law enforcement agencies that exercise jurisdiction on multiple fronts.
For professionals handling sensitive information, the case is a reminder of good practices that are not always strictly followed: separate work and personal environments, avoid the use of non-corporate channels for confidential material, report anomalies and maintain digital hygiene on devices. At the business level, in addition to the technological solutions - from hardware encryption to tools that prevent the copy of screens or detect unusual access patterns - the need for solid legal and contractual controls with former employees and suppliers is important.

The facts reported in the indictment are not isolated in the industry. In recent months, there were other processes related to former engineers that took information from their employers to try to replicate technologies or find rival companies abroad. This pattern has led both companies and legislators to review the rules on the protection of trade secrets and cross-border cooperation in technological research.
As the judicial procedure progresses, it will be necessary to monitor not only the criminal outcome for the accused, but also the implications for the management of safety in the technological sector: what controls proved to be insufficient, what changes the companies concerned introduce and what lessons are drawn from those responsible for public policy. In the meantime, public communiqués and the judicial file are the most direct sources for monitoring the evolution of the case; the formal prosecution and the Government documentation can be found in the note by the Department of Justice and the process has been registered publicly in CourtListenar. For a journalistic approach to the industry's reaction and details of the secrets allegedly involved, Bloomberg's coverage offers more context.
History will continue to develop in the courts and, in parallel, in the security rooms of many technological companies that do not want to repeat a similar chapter. In the end, effective protection of innovation depends on both technical barriers and human behaviour: without both strong pillars, any design, however sophisticated, may be exposed.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...