
In a quiet evening in San Jose, California, three technology engineers faced a sudden and dramatic shift in their lives. Samaneh Ghandali, a 41-year-old female engineer, her husband Mohammad Khosravi, 40, and her sister Soroor Ghandali, 32, were arrested for allegedly stealing trade secrets and sending sensitive information to Iran. Federal agents, after monitoring their digital activities, seized hundreds of clandestine files and photos revealing confidential processor designs and security architectures.
This case illuminates the complex intersection of immigration dreams, high-tech industry confidentiality, and geopolitical tensions. It poses distressing questions about trust and integrity in environments where cutting-edge intellectual property carries immense economic and strategic value. The following details unpack the nature of their activities, the specific information at risk, and broader implications.
From Immigration Dreams to Espionage Allegations
Samaneh and Soroor Ghandali immigrated to the United States from Iran with ambitions to contribute to global technology innovation. They secured positions at leading firms in Silicon Valley, working on smartphone processors for corporations including Google and others identified by the court as system-on-chip developers. Their resumes painted a picture of successful immigrant women engineers thriving in one of the world’s most competitive environments.
However, according to charges, these privileged accesses were exploited to download and photograph hundreds of confidential engineering files. Among the materials were detailed specifications of Google’s Tensor processor for Pixel smartphones and technical designs of integrated machine learning accelerators. These documents hold enormous commercial value and are tightly guarded trade secrets unavailable to the public.
Mohammad Khosravi is also accused of leaking information related to the Snapdragon processor, likely from Qualcomm, where he was employed before his termination in August 2025. This blurs the line between exemplary employee and suspected technology traitor, highlighting how sensitive data can become a liability when misused.
Hidden Methods: Screenshots and Digital Trails
Prosecutors assert that the three engineers avoided direct downloads by taking photos of their computer screens while at work. This method circumvented digital security monitoring, leaving minimal electronic footprints. Numerous images, some reportedly taken just one night before the trio traveled to Iran in December 2023, captured proprietary information including hardware architecture, processor security features, and chip design details.
The stolen materials were then transferred via personal devices and third-party communication platforms that complicate internal security monitoring. These encrypted messaging services are commonly used for international communication but raise challenges for authorities tracking data exfiltration. When Samaneh’s device reportedly accessed these files once in Iran, the case escalated to allegations of direct cross-border intelligence transfers.
Impact on Technology Companies and Security Protocols
Google first detected anomalies through their routine security audits. These included unauthorized downloading of confidential files to personal cloud storage. The company swiftly reacted with enhanced access controls, multi-factor authentication, and real-time monitoring of file transfers, before alerting law enforcement. This incident serves as a cautionary tale for tech firms guarding sensitive intellectual property against insider threats.
The stolen Snapdragon details are particularly concerning because this system-on-chip integrates crucial components such as graphics processing and power-efficient memory. These chips underpin the performance, security, and AI capabilities of billions of mobile devices worldwide. Leakage is not merely a loss of proprietary information but poses risks that adversarial states might exploit vulnerabilities for strategic advantage.
Legal and Geopolitical Dimensions
The defendants face serious charges including conspiracy to steal trade secrets, attempted theft of trade secrets, and obstruction of justice. If convicted, each could face up to 10 years imprisonment per trade secret violation and 20 years for obstructing official proceedings, alongside fines amounting to $250,000 per charge. These stiff penalties reflect the heightened importance of technology protection in global economic and security frameworks.
This case unfolds amid tense US-Iran relations, with ongoing disputes over nuclear agreements and sanctions. Allegations that cutting-edge chip technologies and cryptographic data were transferred to Iran elevate this from a corporate espionage incident to a matter with international security ramifications. The individuals involved now symbolize a microcosm of the broader technological rivalry and geopolitical struggle.
Summary of Key Points
- Three engineers from Iran working in Silicon Valley allegedly stole confidential processor designs and security information.
- The stolen data included Google’s Tensor processor and Qualcomm’s Snapdragon system-on-chip designs, valuable trade secrets worth millions of dollars.
- Methodologies involved covert screenshots to avoid detection and transfer through encrypted communication platforms.
- Google’s enhanced cybersecurity measures and subsequent FBI investigation highlight insider threat vulnerabilities.
- The case is set against the backdrop of fraught US-Iran relations, elevating concerns about technology espionage.
- Legal consequences could include decades in federal prison and substantial financial penalties.
This unprecedented case draws attention to the fragile balance tech companies must maintain between innovation and security. It warns professionals in the sector that unauthorized access to sensitive intellectual property can rapidly metamorphose from career achievement to criminal liability. Moreover, it emphasizes that technological secrets are now frontlines in the global geopolitical arena, where digital betrayal can carry consequences far beyond the workplace.





