Feeds

Huawei accused of corporate theft

Motorola's secrets shipped to China - again?

Choosing a cloud hosting partner with confidence

Motorola has accused its own engineers of sending confidential documents to the founder of Huawei, and claims that the receiving company was well aware that the information was stolen.

The case, filed in Chicago, is against the Lemko Corp and originally accused five former Motorola workers of taking their secrets with them when they moved to Lemko – a company that has a reselling deal with Huawei. But the case has now been amended to accuse named engineers of sending confidential documents direct to Huawei.

Motorola is pretty explicit: "Huawei and its officers knew they were receiving stolen Motorola proprietary trade secrets and confidential information without Motorola’s authorization and consent," according to Reuters' reporting of the complaint. A sent mail was apparently recovered from the engineer's computer, with attached documents bearing the "confidential" stamp.

It's not the first time Motorola and Lemko have been at odds – back in 2008 a Motorola employee (who also seems to have been working for Lemko at the time) was picked up boarding a plane at O'Hare airport, on a one-way trip to China packing more than 1,000 Motorola documents and something in the region of $30,000 in cash too.

But it's not all one way: Lemko has accused ex-staff of taking secrets to Motorola too. Given the physical proximity of the two companies it's not surprising that engineers switch between them, but the flow does, in general, seem to be in Lemko's direction.

Reuters managed to get hold of Huawei, who pointed out that its only relationship with Lemko is that of a reseller, and that the allegations are baseless. Lemko, unsurprisingly, denies everything.

In the incestuous world of radio technologies it's hard to keep secrets from walking out of the door in the heads of engineers, and asking employees to forget all they've experienced is fanciful no matter how many confidentiality agreements they sign. But sending a competitor copies of confidential documents is another matter, and one that should be easier to prove if it's true.

Last time Huawei was accused of stealing trade secrets, by Cisco, the company dropped the routers in question and Cisco dropped the case; both sides claimed victory. But cases like this damage the image of China as a whole, bolstering the stereotypical image that China has been working hard to throw off - that of the industrious duplicator of other people's work. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Mighty Blighty broadbanders beg: Let us lay cable in BT's, er, ducts
Complain to Ofcom that telco has 'effective monopoly'
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.