Taiwan Company Guilty Of Semiconductor IP Theft

A company in Taiwan has been fined $60m after pleading guilty to stealing trade secrets, by hacking a computer memory chip stolen from an American semiconductor company and to make it work they conspired with a Chinese company the US Department of Justice has said. 

In September 2018 a US federal grand jury indicted Taiwan's United Microelectronics Corp (UMC) along with Fujian Jinhua Integrated Circuit Co., Ltd., a state-owned enterprise of the People’s Republic of China (PRC) and three individuals with having stolen trade secrets of an American semiconductor company Micron Technology.

UMC stole the trade secrets of an American leader in computer memory design to enable China to achieve a strategic priority: self-sufficiency in computer memory production without spending its own time or money to earn it, according to US Deputy Attorney General Jeffrey A. Rosen, “This prosecution is an example of the Department of Justice’s successful efforts to defend American companies from those who try to cheat and steal their technology.”

UMC has since  pleaded guilty to a superseding information charging the company with one count of criminal trade secret theft. 

The criminal prosecution of Fujian Jinhua and the three individual defendants will continue, as will a civil action seeking to enjoin Fujian Jinhua from the further transfer of stolen trade secrets and the export to the United States of products manufactured by Fujian Jinhua that were made using the stolen trade secrets. 

In particular, one file containing Micron’s trade secrets were used to adjust UMC’s design rules. Later, when Taiwan authorities searched UMC’s offices, employees were told by management to conceal their notes, USB drives,personal phones and other equipment from investigators.

These cases have global significance when a foreign defendant is charged with stealing intellectual property protected by US law.


US Dept. of Justice:        Infosecurity Magazine:       Standard & Poor        Caixin:       Focus Taiwan

You Might Also Read:

US Ban On Semiconductor Exports To China Hits Huawei:

 

« Criminals Have Ramped Up Covid-19 Related Attacks
Fake News Is A Big Problem For CISOs »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Metasploit

Metasploit

Metasploit penetration testing software helps find security issues, verify vulnerabilities and manage security assessments.

Appdome

Appdome

Appdome is the industry's first mobile integration as a service company, providing solutions for enterprise mobility and mobile application security.

ClearDATA

ClearDATA

The ClearDATA Managed Cloud protects sensitive healthcare data using purpose-built DevOps automation, compliance and security safeguards, and healthcare expertise.

Securely

Securely

Securely Ltd. is an IT consulting and services firm specializing in PKI solutions and products.

e-Lock

e-Lock

e-Lock services include IT security consulting and training, security systems integration, managed security and technical support.

Cube 5

Cube 5

The Cube 5 incubator, located at the Horst Görtz Institute for IT Security (HGI), supports IT security startups and people interested in starting a business in IT security.

Tego Cyber

Tego Cyber

Tego Cyber delivers a state-of-the-art threat intelligence platform that helps enterprises deploy the proper resolution to an identified threat before the enterprise is compromised.

Periculus

Periculus

Periculus makes managing digital risk simple. Its integrated platform offers access to purchase cyber insurance and cyber security solutions uniquely tailored to fit the needs of every business.

Alibaba Cloud

Alibaba Cloud

Alibaba Cloud is committed to safeguarding the cloud security for every business by leveraging a comprehensive suite of enterprise security services and products on the platform.

Cyber Security Council UAE

Cyber Security Council UAE

The Cyber Security Council's vision is to protect UAE cyberspace, maintain confidence in our digital infrastructure and institutions, and build a cyber-resilient society.

Data Defenders

Data Defenders

Data Defenders provide information security technology solutions that empower consumers, businesses and governments with safe and secure IT and cybersecurity infrastructures.

CyberSanctus

CyberSanctus

CyberSanctus provide clients with a variety of pentest plans from the entry level starter plan, which is tailored for personal websites, to enterprise level pentests, tailored for large scale business

Kralos

Kralos

Kralos are an experienced team of Software and IT experts, specialized in the development of innovative cybersecurity solutions.

Conceal

Conceal

Conceal’s mission is to stop ransomware and credential theft for companies of all sizes by developing innovative solutions that provide social engineering protection in any browser.

ARC Risk and Compliance

ARC Risk and Compliance

ARC Risk and Compliance is a consulting company comprised of a team of AML Specialists completely focused on anti-money laundering compliance and the technologies used to support compliance programs.

Black Duck Software

Black Duck Software

Black Duck (formerly the Synopsys Software Integrity Group) is the market leader in application security testing (AST).