Trade Secret Cyber Theft in USA

1. What Counts as a Trade Secret?

Under U.S. law, a trade secret includes information that:

  • Derives economic value from not being publicly known
  • Is subject to reasonable efforts to maintain secrecy

Examples:

  • Algorithms and source code
  • Customer databases
  • Manufacturing processes
  • AI models and training data
  • Chemical formulas
  • Semiconductor designs

2. Common Cyber Methods of Trade Secret Theft

  • Email forwarding of confidential files
  • USB or external drive downloads
  • Cloud account hacking
  • Remote desktop infiltration
  • Employee insider copying before resignation (β€œspringboarding”)
  • Corporate espionage malware
  • Credential theft and phishing attacks

3. Legal Consequences in the U.S.

Trade secret cyber theft may result in:

  • Civil lawsuits (injunctions, damages, royalties)
  • Criminal prosecution (fines and imprisonment under EEA)
  • Seizure of devices and digital evidence
  • Global injunctions and asset freezes

4. Key Case Laws (6+ Major Cases)

Case 1: Waymo LLC v. Uber Technologies, Inc. (2017–2018)

  • Issue: Alleged theft of self-driving car technology by former Google engineer Anthony Levandowski
  • Allegation: Downloading 14,000+ confidential files before joining Uber
  • Outcome:
    • Uber settled for equity worth approximately $245 million
    • Criminal charges filed against Levandowski under trade secret theft laws

Principle:
πŸ‘‰ Digital copying of proprietary AI and autonomous vehicle data constitutes trade secret theft even without physical removal.

Case 2: United States v. Sinovel Wind Group Co. (2018)

  • Issue: Theft of wind turbine software source code
  • Method: Cyber intrusion and manipulation of former employee access
  • Outcome:
    • Chinese company convicted in U.S. federal court
    • Significant criminal penalties imposed

Principle:
πŸ‘‰ Foreign corporations can be held criminally liable in U.S. courts for cyber-enabled trade secret theft.

Case 3: E.I. du Pont de Nemours & Co. v. Kolon Industries, Inc. (2011–2015)

  • Issue: Theft of Kevlar-related trade secrets
  • Method: Hiring insiders and obtaining confidential DuPont documents electronically
  • Outcome:
    • $919 million jury verdict (later reduced/settled)
    • Criminal convictions of individuals involved

Principle:
πŸ‘‰ Electronic transfer of proprietary chemical formulas through employees qualifies as trade secret misappropriation.

Case 4: United States v. Zhang (2018–2021) – Apple Self-Driving Car Case

  • Issue: Theft of Apple autonomous vehicle project data
  • Method:
    • Employee downloaded thousands of files
    • Attempted to transfer data to foreign competitor
  • Outcome:
    • Criminal prosecution under Economic Espionage Act
    • Sentencing in federal court

Principle:
πŸ‘‰ Attempted cyber export of trade secrets is punishable even if technology is not successfully commercialized.

Case 5: Motorola Solutions, Inc. v. Hytera Communications Corp. (2017–2020)

  • Issue: Theft of digital communications technology
  • Method:
    • Former employees transferred source code and system architecture files
  • Outcome:
    • Jury awarded over $700 million damages (later increased in treble damages phase)
    • Finding of willful and malicious misappropriation

Principle:
πŸ‘‰ Systematic digital copying of proprietary code constitutes willful trade secret theft, justifying enhanced damages.

Case 6: United States v. Agrawal (2013)

  • Issue: High-frequency trading source code theft from Goldman Sachs
  • Method:
    • Insider copied proprietary trading algorithms
  • Outcome:
    • Criminal conviction under Economic Espionage Act
    • Sentenced to prison

Principle:
πŸ‘‰ Financial algorithms and trading systems are protected trade secrets; insider cyber copying is criminal theft.

Case 7: United States v. Jin (2008)

  • Issue: Theft of DuPont Kevlar trade secrets
  • Method:
    • Employee copied digital files and planned transfer to foreign entity
  • Outcome:
    • Conviction under Economic Espionage Act
    • Prison sentence imposed

Principle:
πŸ‘‰ Intent to transfer digital trade secrets abroad strengthens criminal liability even before actual misuse.

Case 8: United States v. Chung (Boeing case, 2009)

  • Issue: Espionage involving aerospace trade secrets
  • Method:
    • Stored confidential Boeing documents electronically for foreign government benefit
  • Outcome:
    • Conviction and prison sentence

Principle:
πŸ‘‰ Cyber storage of sensitive aerospace designs for foreign use qualifies as economic espionage.

5. Key Legal Principles from Case Law

(A) Digital Copying = Theft

Courts consistently hold:

  • Copying files without authorization = misappropriation
  • Physical removal is not required

(B) Insider Threat is the Most Common Vector

Most cases involve:

  • Employees leaving companies
  • Contractors with access rights
  • Engineers moving to competitors

(C) Intent Matters Strongly

Liability increases when:

  • There is intent to benefit a competitor
  • Data is transferred overseas
  • Encryption or concealment is used

(D) Trade Secrets Include Modern Tech Assets

Protected assets now include:

  • AI models
  • Software source code
  • Cloud infrastructure designs
  • Machine learning datasets

(E) Criminal + Civil Liability Coexist

A single act may trigger:

  • DTSA civil lawsuit
  • EEA criminal prosecution
  • CFAA computer intrusion charges

6. Corporate Cyber Obligations to Prevent Trade Secret Theft

Companies in the U.S. are expected to implement:

1. Access Control Systems

  • Role-based access (least privilege)
  • Multi-factor authentication
  • Logging of downloads and file transfers

2. Data Loss Prevention (DLP)

  • Monitoring email and USB transfers
  • Blocking unauthorized cloud uploads

3. Employee Exit Controls

  • Device audits before resignation
  • Revocation of credentials
  • Forensic imaging of systems

4. Encryption and Segmentation

  • Encrypt sensitive databases
  • Separate R&D networks from general systems

5. Monitoring & Incident Response

  • Real-time alerts for mass downloads
  • Cyber forensic investigation protocols

7. Conclusion

Trade secret cyber theft in the United States is treated as a serious economic crime and corporate tort, enforced aggressively through both civil litigation and federal prosecution.

Case law such as:

  • Waymo v Uber
  • DuPont v Kolon
  • Motorola v Hytera
  • U.S. v Agrawal
  • U.S. v Sinovel

demonstrates a consistent judicial approach:
πŸ‘‰ Digital misappropriation of confidential business data is equivalent to theft, regardless of whether physical property is taken.

The legal system strongly prioritizes:

  • Protection of innovation
  • Cyber deterrence
  • Insider threat control
  • Cross-border enforcement

LEAVE A COMMENT