Morning Overview

White House says China is behind “industrial-scale” theft of U.S. AI tech

A former Google engineer is heading to federal prison after stealing proprietary AI secrets. A congressional investigation has mapped smuggling networks that funnel advanced chips to Chinese labs. And the White House, in late April 2026, publicly accused Beijing of running what it called an “industrial-scale” campaign to strip American companies of their most valuable artificial intelligence technology.

Taken together, these developments mark a turning point: Washington is no longer treating AI theft linked to China as a scattering of one-off cases. Officials across the executive branch, Congress, and the Justice Department now describe it as a coordinated national security threat, and they are racing to build the legal and regulatory architecture to fight back.

The criminal case that proved the threat is real

The most concrete evidence arrived in a federal courtroom. Linwei Ding, a former Google engineer, was convicted on 14 counts, seven for economic espionage and seven for theft of trade secrets, after a jury found he had systematically exfiltrated confidential AI technology over a period of months. The case, United States v. Linwei Ding (No. 24-cr-00141 VC, N.D. Cal.), laid out in granular detail how Ding accessed proprietary systems, copied sensitive files, and attempted to leverage those assets in connection with Chinese entities.

The conviction matters because it moves the conversation past speculation. Fourteen guilty verdicts, backed by the evidentiary standard of a federal trial, confirm that proprietary model architectures, training pipelines, and optimization techniques are now prime espionage targets, not just traditional hardware or source code.

What Congress found

The U.S. House Select Committee on the Strategic Competition Between the United States and the Chinese Communist Party released an investigative report describing how Chinese entities acquire advanced AI chips through smuggling networks and replicate American AI capabilities through a technique known as model distillation. In simple terms, distillation allows a smaller, cheaper model to mimic the behavior of a larger, more powerful one by training on its outputs, effectively copying a competitor’s work without ever touching its source code.

The committee’s report also documented procurement fraud schemes designed to circumvent U.S. export controls on high-end semiconductors. At an April 16, 2026, hearing, named witnesses testified about specific theft vectors: distillation of proprietary models, insider recruitment at U.S. tech firms, and cyber intrusions targeting AI research environments. Those accounts gain additional weight when they align with prosecutorial records like the Ding conviction.

Committee reports carry political weight and can draw on classified information, but they are produced by elected officials with policy agendas. The findings are most persuasive where they overlap with independently verifiable evidence, such as federal indictments or court records.

A new bill targets model theft directly

Lawmakers responded with H.R. 8283, the Deterring American AI Model Theft Act of 2026. The bill would, for the first time, write “model extraction attacks” into federal statute, creating dedicated definitions, enforcement processes, and penalties tied to sanctions and export controls. Until now, prosecutors pursuing AI theft have relied on broader trade secret and espionage laws that were not designed with machine learning in mind.

The bill is still in its early stages. There is no public record of committee markup, floor votes, or a formal White House endorsement. Whether it advances as a standalone measure, gets folded into a larger national security package, or stalls entirely will depend on negotiations and industry feedback that have not yet played out. For now, its significance is as a signal: key members of Congress believe existing legal tools are not enough. (Note: if the Congress.gov link above does not resolve, the bill text may not yet be available in the public legislative database.)

The White House response and Beijing’s pushback

Administration officials have framed recent policy actions as a crackdown on foreign exploitation of U.S. AI, pointing to a pattern of Chinese-linked efforts to harvest American models and training data. A White House memo targeting such exploitation has been described by officials and covered by major news outlets, though the full text of the directive had not been publicly released as of late April 2026. That gap matters: until the formal language is published, companies cannot fully assess new compliance obligations and must rely on secondhand summaries.

Beijing has pushed back sharply. The Chinese Embassy in Washington rejected the allegations and accused the United States of politicizing technology competition. A Foreign Ministry spokesperson in Beijing echoed those remarks. However, the specific wording of China’s rebuttal is available only through secondary news reporting rather than a direct embassy statement or official transcript, which limits the ability of outside observers to compare the two governments’ claims on equal footing.

What is still missing from the public record

For all the activity in courtrooms and hearing rooms, significant gaps remain. No official estimate of total economic losses from AI theft has been released by the committee, the Justice Department, or the White House. The congressional report uses qualitative language about “industrial-scale” operations but offers no specific dollar figure, incident count, or tally of compromised models. Without that data, the true scope of the problem is difficult for independent analysts to measure, and current damage estimates remain largely inferential.

The absence of hard numbers argues against overreaction. It is difficult to justify sweeping claims that the United States has already lost its competitive edge, or that every collaboration with Chinese researchers is inherently risky, when the evidence base, while serious, is still incomplete. Policymakers and corporate security teams will need to navigate between complacency and alarmism, grounding decisions in what is actually verified: a high-profile conviction, a detailed investigative report, and an early-stage legislative push.

What companies and policymakers should watch next

For U.S. AI firms, the practical implications are already taking shape. The Ding case puts every company on notice that insider risk extends well beyond traditional hardware or source code. Congressional attention to chip smuggling and model distillation signals that regulators will increasingly expect access logging, anomaly detection, and export-control compliance to be treated as core governance functions rather than afterthoughts.

The next milestones to watch: whether additional indictments follow the Ding conviction, whether the White House publishes the full text of its AI exploitation directive, and whether H.R. 8283 gains traction in committee. Each of those developments would add a new layer of concrete evidence to a story that, as of May 2026, rests on a small but growing foundation of verified facts. The picture is sharpening, but it is not yet complete.

More from Morning Overview

*This article was researched with the help of AI, with human editors creating the final content.