Trade Secret Cyber Theft in USA
1. What Counts as a Trade Secret?
Under U.S. law, a trade secret includes information that:
- Derives economic value from not being publicly known
- Is subject to reasonable efforts to maintain secrecy
Examples:
- Algorithms and source code
- Customer databases
- Manufacturing processes
- AI models and training data
- Chemical formulas
- Semiconductor designs
2. Common Cyber Methods of Trade Secret Theft
- Email forwarding of confidential files
- USB or external drive downloads
- Cloud account hacking
- Remote desktop infiltration
- Employee insider copying before resignation (βspringboardingβ)
- Corporate espionage malware
- Credential theft and phishing attacks
3. Legal Consequences in the U.S.
Trade secret cyber theft may result in:
- Civil lawsuits (injunctions, damages, royalties)
- Criminal prosecution (fines and imprisonment under EEA)
- Seizure of devices and digital evidence
- Global injunctions and asset freezes
4. Key Case Laws (6+ Major Cases)
Case 1: Waymo LLC v. Uber Technologies, Inc. (2017β2018)
- Issue: Alleged theft of self-driving car technology by former Google engineer Anthony Levandowski
- Allegation: Downloading 14,000+ confidential files before joining Uber
- Outcome:
- Uber settled for equity worth approximately $245 million
- Criminal charges filed against Levandowski under trade secret theft laws
Principle:
π Digital copying of proprietary AI and autonomous vehicle data constitutes trade secret theft even without physical removal.
Case 2: United States v. Sinovel Wind Group Co. (2018)
- Issue: Theft of wind turbine software source code
- Method: Cyber intrusion and manipulation of former employee access
- Outcome:
- Chinese company convicted in U.S. federal court
- Significant criminal penalties imposed
Principle:
π Foreign corporations can be held criminally liable in U.S. courts for cyber-enabled trade secret theft.
Case 3: E.I. du Pont de Nemours & Co. v. Kolon Industries, Inc. (2011β2015)
- Issue: Theft of Kevlar-related trade secrets
- Method: Hiring insiders and obtaining confidential DuPont documents electronically
- Outcome:
- $919 million jury verdict (later reduced/settled)
- Criminal convictions of individuals involved
Principle:
π Electronic transfer of proprietary chemical formulas through employees qualifies as trade secret misappropriation.
Case 4: United States v. Zhang (2018β2021) β Apple Self-Driving Car Case
- Issue: Theft of Apple autonomous vehicle project data
- Method:
- Employee downloaded thousands of files
- Attempted to transfer data to foreign competitor
- Outcome:
- Criminal prosecution under Economic Espionage Act
- Sentencing in federal court
Principle:
π Attempted cyber export of trade secrets is punishable even if technology is not successfully commercialized.
Case 5: Motorola Solutions, Inc. v. Hytera Communications Corp. (2017β2020)
- Issue: Theft of digital communications technology
- Method:
- Former employees transferred source code and system architecture files
- Outcome:
- Jury awarded over $700 million damages (later increased in treble damages phase)
- Finding of willful and malicious misappropriation
Principle:
π Systematic digital copying of proprietary code constitutes willful trade secret theft, justifying enhanced damages.
Case 6: United States v. Agrawal (2013)
- Issue: High-frequency trading source code theft from Goldman Sachs
- Method:
- Insider copied proprietary trading algorithms
- Outcome:
- Criminal conviction under Economic Espionage Act
- Sentenced to prison
Principle:
π Financial algorithms and trading systems are protected trade secrets; insider cyber copying is criminal theft.
Case 7: United States v. Jin (2008)
- Issue: Theft of DuPont Kevlar trade secrets
- Method:
- Employee copied digital files and planned transfer to foreign entity
- Outcome:
- Conviction under Economic Espionage Act
- Prison sentence imposed
Principle:
π Intent to transfer digital trade secrets abroad strengthens criminal liability even before actual misuse.
Case 8: United States v. Chung (Boeing case, 2009)
- Issue: Espionage involving aerospace trade secrets
- Method:
- Stored confidential Boeing documents electronically for foreign government benefit
- Outcome:
- Conviction and prison sentence
Principle:
π Cyber storage of sensitive aerospace designs for foreign use qualifies as economic espionage.
5. Key Legal Principles from Case Law
(A) Digital Copying = Theft
Courts consistently hold:
- Copying files without authorization = misappropriation
- Physical removal is not required
(B) Insider Threat is the Most Common Vector
Most cases involve:
- Employees leaving companies
- Contractors with access rights
- Engineers moving to competitors
(C) Intent Matters Strongly
Liability increases when:
- There is intent to benefit a competitor
- Data is transferred overseas
- Encryption or concealment is used
(D) Trade Secrets Include Modern Tech Assets
Protected assets now include:
- AI models
- Software source code
- Cloud infrastructure designs
- Machine learning datasets
(E) Criminal + Civil Liability Coexist
A single act may trigger:
- DTSA civil lawsuit
- EEA criminal prosecution
- CFAA computer intrusion charges
6. Corporate Cyber Obligations to Prevent Trade Secret Theft
Companies in the U.S. are expected to implement:
1. Access Control Systems
- Role-based access (least privilege)
- Multi-factor authentication
- Logging of downloads and file transfers
2. Data Loss Prevention (DLP)
- Monitoring email and USB transfers
- Blocking unauthorized cloud uploads
3. Employee Exit Controls
- Device audits before resignation
- Revocation of credentials
- Forensic imaging of systems
4. Encryption and Segmentation
- Encrypt sensitive databases
- Separate R&D networks from general systems
5. Monitoring & Incident Response
- Real-time alerts for mass downloads
- Cyber forensic investigation protocols
7. Conclusion
Trade secret cyber theft in the United States is treated as a serious economic crime and corporate tort, enforced aggressively through both civil litigation and federal prosecution.
Case law such as:
- Waymo v Uber
- DuPont v Kolon
- Motorola v Hytera
- U.S. v Agrawal
- U.S. v Sinovel
demonstrates a consistent judicial approach:
π Digital misappropriation of confidential business data is equivalent to theft, regardless of whether physical property is taken.
The legal system strongly prioritizes:
- Protection of innovation
- Cyber deterrence
- Insider threat control
- Cross-border enforcement

comments