NextFin News - In a significant blow to Silicon Valley’s intellectual property protections, the U.S. Department of Justice (DoJ) announced on February 20, 2026, the indictment of three individuals for the alleged theft of trade secrets from Google and other major technology firms. The defendants, identified as Samaneh Ghandali, 41, her sister Soroor Ghandali, 32, and Samaneh’s husband Mohammadjavad Khosravi, 40, are accused of exfiltrating sensitive data related to mobile computer processors and transferring it to unauthorized locations, including Iran. According to The Hacker News, the trio, all Iranian nationals residing in San Jose, were arrested on Thursday and made their initial appearances in federal court today.
The indictment reveals a calculated scheme where the Ghandali sisters leveraged their positions at Google to access confidential files concerning the company’s Tensor processor—the proprietary silicon powering Pixel smartphones. Prosecutors allege that Samaneh transferred hundreds of files to private communication channels before her access was revoked in August 2023. Following her departure, she allegedly signed a false affidavit claiming no confidential information had been shared. However, investigators found that the defendants continued to access and photograph sensitive documents, even searching for methods to delete digital footprints. In one instance, Samaneh reportedly captured images of Khosravi’s work screen at a separate tech firm just hours before traveling to Iran in December 2023. If convicted, the defendants face up to 10 years in prison for each count of trade secret theft and up to 20 years for obstruction of justice.
This case represents a critical failure in the "trust but verify" model that has long defined Silicon Valley’s corporate culture. The methodology employed—manually photographing screens to bypass digital exfiltration alarms—demonstrates a sophisticated understanding of modern Data Loss Prevention (DLP) systems. While Google’s internal security eventually flagged the activity, the months-long duration of the breach suggests that even the most advanced tech giants struggle with the "analog hole" in their security architecture. For the semiconductor industry, where the development of a single chip architecture like the Tensor can cost hundreds of millions of dollars in R&D, such leaks are not merely corporate losses but systemic threats to competitive advantage.
From a geopolitical perspective, the transfer of cryptography and processor security data to Iran is particularly alarming. As U.S. President Trump continues to emphasize the protection of American innovation from foreign adversaries, this incident highlights the shifting frontlines of national security. Advanced mobile processors are dual-use technologies; the same architecture that optimizes a smartphone's AI can be repurposed for military signal processing or encrypted communications. The involvement of Iranian nationals in this specific theft suggests a targeted effort to bridge the technological gap between Western silicon capabilities and sanctioned states.
The economic impact of such intellectual property (IP) theft is staggering. According to the Commission on the Theft of American Intellectual Property, IP theft costs the U.S. economy between $225 billion and $600 billion annually. In the high-stakes world of System-on-Chip (SoC) design, the loss of trade secrets regarding power management, security enclaves, and instruction sets can allow competitors—or hostile states—to leapfrog years of development. This case follows the recent conviction of another former Google engineer, Linwei Ding, who was found guilty in January 2026 of stealing AI secrets for a Chinese startup, indicating a broader trend of state-sponsored or state-aligned industrial espionage targeting the core of the U.S. tech stack.
Looking forward, this indictment is likely to trigger a paradigm shift in how tech companies manage high-value human capital. We can expect a move toward "Zero Trust" internal environments, where access to sensitive hardware designs is restricted by more than just digital credentials. Enhanced behavioral analytics, stricter non-compete enforcement (where legal), and more rigorous vetting for employees with access to "crown jewel" technologies will become the industry standard. Furthermore, the U.S. government, under the direction of U.S. President Trump, is expected to tighten export controls and oversight on the movement of technical data, potentially treating high-end chip designs with the same level of scrutiny as physical munitions. As the technological cold war intensifies, the boundary between corporate security and national defense will continue to blur, making the protection of silicon secrets a primary theater of conflict.
Explore more exclusive insights at nextfin.ai.
