The unsealing of a federal indictment in February 2026 revealed a sophisticated conspiracy involving former Google engineers and their family members. This case, centered on the exfiltration of proprietary hardware technology to Iran, provides a rare window into the tactics used by malicious insiders to bypass corporate security (Source: U.S. Department of Justice, Office of Public Affairs, Feb 2026).
While most security discussions focus on external hackers, this case highlights the human element of cybersecurity. It shows how personal relationships and physical access can be leveraged to defeat even the most advanced digital defenses.
The Mechanics of Exfiltration
The defendants did not rely on a single method of theft. Instead, they used a tiered approach that adapted as corporate security measures were triggered. According to court documents, the exfiltration happened through three primary channels (Source: U.S. Attorney’s Office, Northern District of California, 2026).
1. Staging via Third-Party Messaging
Before leaving their roles, the suspects allegedly moved over 300 sensitive files to a third-party messaging platform. By using a platform that was not the primary corporate storage (like Google Drive), they likely hoped to avoid the immediate scrutiny of automated data loss prevention (DLP) tools that monitor internal repositories. This staging area allowed them to organize and download data onto personal devices at their leisure (Source: FBI San Francisco Field Office, 2026).
2. The Analog Hole: Manual Photography
One of the most difficult methods to stop was the use of mobile phones to take pictures of computer monitors. After Google revoked access for one of the engineers, she reportedly used her husband’s credentials at another technology firm to photograph sensitive designs. This analog hole bypasses digital tracking because no data is actually transferred over the network; it is captured as an image on an air-gapped personal device.
3. Cross-Corporate Contamination
The suspects allegedly moved data between three different technology firms. By moving Google’s secrets onto the networks of Company 2 and Company 3, they obscured the origin of the files. This created a forensic nightmare, as no single company had full visibility into the movement of the intellectual property across the different corporate environments.
Building a Defense Against the Malicious Insider
The Ghandali case proves that traditional perimeter security is insufficient. To mitigate these risks, organizations must look toward integrated behavioral and physical controls.
Enhanced User Behavior Analytics (UEBA)
Modern security teams must deploy UEBA tools that look for low and slow data movement. In this case, detection was triggered by suspicious activity prior to the engineer’s termination. Systems that flag access to hardware designs outside an employee’s current project scope can provide the early warning needed to intervene before data leaves the building.
Hardware-Based Privacy Controls
To address the analog hole, organizations handling high-value IP can utilize physical screen filters that restrict viewing angles, making it nearly impossible to get a clear photograph of a screen from a distance. In high-security labs, strict no-phone zones or lockers for personal electronics are a necessary, albeit culturally difficult, requirement.
Unified Insider Threat Intelligence
A major takeaway from this indictment is the risk of spouse-linked exfiltration. Companies should consider integrated risk scoring that accounts for household relationships in high-stakes roles. When an employee is offboarded under suspicious circumstances, security protocols should extend to checking for connections to other employees or contractors who might serve as an unwitting (or willing) secondary bridge for data theft.
Zero Trust and Least Privilege
Moving beyond simple identity management to a true Zero Trust architecture is vital. This means that access to a hardware blueprint is not just granted based on job title but requires a just in time justification that is logged and audited.
Sources:
1. U.S. Department of Justice (Feb 2026): https://www.justice.gov/opa/pr/former-google-engineers-and-spouse-indicted-theft-trade-secrets
2. FBI San Francisco (2026): https://www.fbi.gov/contact-us/field-offices/sanfrancisco/news
3. Northern District of California Court Records (2026): https://www.cand.uscourts.gov/cases-e-filing/notable-cases/


Leave a Reply