Feeds

Huawei accused of corporate theft

Motorola's secrets shipped to China - again?

The Power of One Infographic

Motorola has accused its own engineers of sending confidential documents to the founder of Huawei, and claims that the receiving company was well aware that the information was stolen.

The case, filed in Chicago, is against the Lemko Corp and originally accused five former Motorola workers of taking their secrets with them when they moved to Lemko – a company that has a reselling deal with Huawei. But the case has now been amended to accuse named engineers of sending confidential documents direct to Huawei.

Motorola is pretty explicit: "Huawei and its officers knew they were receiving stolen Motorola proprietary trade secrets and confidential information without Motorola’s authorization and consent," according to Reuters' reporting of the complaint. A sent mail was apparently recovered from the engineer's computer, with attached documents bearing the "confidential" stamp.

It's not the first time Motorola and Lemko have been at odds – back in 2008 a Motorola employee (who also seems to have been working for Lemko at the time) was picked up boarding a plane at O'Hare airport, on a one-way trip to China packing more than 1,000 Motorola documents and something in the region of $30,000 in cash too.

But it's not all one way: Lemko has accused ex-staff of taking secrets to Motorola too. Given the physical proximity of the two companies it's not surprising that engineers switch between them, but the flow does, in general, seem to be in Lemko's direction.

Reuters managed to get hold of Huawei, who pointed out that its only relationship with Lemko is that of a reseller, and that the allegations are baseless. Lemko, unsurprisingly, denies everything.

In the incestuous world of radio technologies it's hard to keep secrets from walking out of the door in the heads of engineers, and asking employees to forget all they've experienced is fanciful no matter how many confidentiality agreements they sign. But sending a competitor copies of confidential documents is another matter, and one that should be easier to prove if it's true.

Last time Huawei was accused of stealing trade secrets, by Cisco, the company dropped the routers in question and Cisco dropped the case; both sides claimed victory. But cases like this damage the image of China as a whole, bolstering the stereotypical image that China has been working hard to throw off - that of the industrious duplicator of other people's work. ®

The Power of One Infographic

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
Microsoft unsheathes cheap Android-killer: Behold, the Lumia 530
Say it with us: I'm King of the Landfill-ill-ill-ill
All those new '5G standards'? Here's the science they rely on
Radio professor tells us how wireless will get faster in the real world
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Oh girl, you jus' didn't: Level 3 slaps Verizon in Netflix throttle blowup
Just hook us up to more 10Gbps ports, backbone biz yells in tit-for-tat spat
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.