LOS ANGELES – An Inland Empire man has been arrested on a criminal complaint alleging he stole sensitive technologies from his Southern California-based employers and used them to market his own competing company to businesses in the People’s Republic of China (PRC).
Liming Li, 64, of Rancho Cucamonga, is charged with theft of trade secrets. Li was arrested at Ontario International Airport on May 6 after arriving on a flight from Taiwan. Since his arrest, Li has been in federal custody, and he has a detention hearing scheduled for May 22.
“Li stole thousands of files of sensitive technology that did not belong to him and used it to help foreign companies build competing technology – technology that could be used in the manufacture of nuclear submarines and military aircraft,” said United States Attorney Martin Estrada. “Protecting our nation’s national security is paramount, and my office will aggressively investigate and prosecute those who misappropriate sensitive intellectual property to the benefit of foreign actors.”
“The FBI Los Angeles Field Office takes the protection of our national security and critical technology extremely seriously,” said FBI Assistant Director in Charge Donald Alway. “Foreign adversaries, including the Chinese government, actively seek to erode American competitiveness in the global economy, diminish trust in fair market competition, and use stolen knowledge to increase their military modernization capabilities. Stealing proprietary information not only affects U.S. businesses, but, over time destabilizes American economic security. The FBI is dedicated to countering efforts of those seeking to illegally acquire sensitive information.”
The case against Li was brought under the auspices of the Disruptive Technology Strike Force, which is co-led by the Departments of Justice and Commerce. The Strike Force seeks to counter efforts by hostile nation-states to illicitly acquire sensitive U.S. technology to advance their authoritarian regimes and facilitate human rights abuses. The case against Li is one of five announced this morning at a news conference at the Department of Justice where officials detailed cases against defendants accused of crimes that include export violations, smuggling and theft of trade secrets.
According to an affidavit filed with the complaint filed in Los Angeles, from 1996 to November 2019, Li worked in various engineering, management and software development roles for two companies in Southern California. The companies are identified in court documents as “Company #1” and “Company #2.”
These software programs are related to high precision measurement studies interpretation and point cloud technology, which often are used in making 3D models. They can be used in various sensitive manufacturing contexts, including manufacturing parts for nuclear submarines and military aircraft, and are subject to United States export controls for national security, nuclear nonproliferation and anti-terrorism reasons. As a result of its military application, federal law mandates that this software cannot be exported to the PRC without a license from the Department of Commerce.
Li worked for Company #1 from 1996 to 2018 and then worked at Company #2 from 2018 until November 2019. Shortly before beginning his employment with the Company #2, Li and his wife established their own business, JSL Innovations, which was based out of their Rancho Cucamonga home.
After Company #2 terminated Li, company security discovered that Li was using his company-issued laptop to attempt to download files from Company #2’s root directory onto his personal external hard drive, according to the complaint affidavit. Company security searched Li’s company-issued laptop and found a folder labeled “ChinaGovernment.” That folder allegedly contained numerous documents showing Li’s efforts to participate in the PRC’s Thousand Talents Program and to use JSL Innovations to provide services and technology to PRC business and government entities related to the export-controlled and trade secret technology that Li took from his former employers in Southern California.
In March 2020, Li entered into an agreement with a PRC-based manufacturing company to serve as its chief technology officer. Li’s agreement with this employer required him to spend at least six months per year in the PRC.
Six months later, FBI agents executed a search warrant at LI’s home and found numerous digital devices containing millions of files belonging to Company #1 and Company #2 and containing the source code for those companies’ proprietary software, the complaint alleges. Although the source code files had been developed by and belonged to these companies, some of the files had been moved into folders labeled “JSL” or “JSL Projects.”
Both Company #1 and Company #2 derive significant value from the secrecy of their proprietary software source code and take extensive steps to protect the source code from discovery by competitors.
A criminal complaint is merely an accusation. All defendants are presumed innocent until proven guilty beyond a reasonable doubt in a court of law.
If convicted, Li would face a statutory maximum sentence of 10 years in federal prison.
The FBI is investigating this matter with substantial assistance from the Department of Commerce, Office of Export Enforcement, Bureau of Industry and Security.
Assistant United States Attorneys Solomon Kim of the Terrorism and Export Crimes Section; David Ryan, Chief of the Terrorism and Export Crimes Section; Aaron Frumkin of the Cyber and Intellectual Property Crime Section; and Trial Attorney Stephen Marzen of the Justice Department’s National Security Division’s Counterintelligence and Export Control Section are prosecuting the case.
The Disruptive Technology Strike Force is an interagency law enforcement strike force co-led by the Departments of Justice and Commerce. It is designed to target illicit actors, protect supply chains, and prevent critical technology from being acquired by authoritarian regimes and hostile nation-states. Under the leadership of the Assistant Attorney General for National Security and the Assistant Secretary of Commerce for Export Enforcement, the Strike Force leverages tools and authorities across the U.S. Government to enhance the criminal and administrative enforcement of export control laws.