We found that six weeks before his resignation this former employee, Anthony Levandowski, downloaded over 14,000 highly confidential and proprietary design files for Waymo’s various hardware systems, including designs of Waymo’s LiDAR and circuit board. To gain access to Waymo’s design server, Mr. Levandowski searched for and installed specialized software onto his company-issued laptop. Once inside, he downloaded 9.7 GB of Waymo’s highly confidential files and trade secrets, including blueprints, design files and testing documentation. Then he connected an external drive to the laptop. Mr. Levandowski then wiped and reformatted the laptop in an attempt to erase forensic fingerprints.
After reading the transcript of the testimony on what Google actually knows about (1), it's actually less convincing in my opinion than Google's wording makes it sound (which is to be expected from lawyers making a case). I still believe Levandowski likely took trade secrets, but it's much less compelling when you read the details. There's a link to it in this HN comment[1], and I reply with what I think is a fair summary.
If I recall, Google/Waymo claimed in their filing that he had never used the Subversion repository in question from that laptop in the course of his employment, until that moment. They further claim he actually searched MoMA for how to access it as well as how to do end-to-end setup. He then left not long after that checkout. That is unusual, if true.
Yes, but it was also a previously unused laptop, so it's not all that unusual for someone setting up a work system to make sure their work access is set up. It is odd that it happened towards the end, and that it wasn't used afterwards, but I can also see it being something I might do in preperation if I had to take a short trip and hadn't set up a remote work laptop yet or my prior one was causing problems. That it wasn't used might have been that he ended up not doing any work (or any work that required the laptop) during the period he wanted it. A single normal SVN checkout during the setup would get every file in the repo by default.
Basically, I don't think it's hard to construct an entirely innocent narrative of events (assuming SVN access was normal for him). The later developments do make it look fishy, but since I doubt anyone would have thought anything amiss with the list of actions without the later events, it's far from a smoking gun when taken by itself.
Sure, when it's summarized like that, it sounds bad, and it maybe bad. But compare that to this slightly expanded timeline summary from reading the actual filing[1]:
The laptop in question connected to Google only 3 times between March 2, 2015 and November 25, 2015, despite being configured to connect every 15 minutes. ~ 2 hours on Oct 22, ~2 hours on Nov 20, and "briefly" on Nov 25. (My interpretation? It was almost always off and not in use).
Windows was reinstalled on Nov 26th.
On Dec 3, searched were done on Google's internal search system for how to log in and setup access through SVN to the driving car project ("chauffer").
Tortoise SVN was downloaded and installed on Dec 11. It then "downloaded over 14,000 files from the SVN repository". (My interpretation? A SVN checkout of the entire repo was done).
A USB card reader was attached on Dec 14 for about 8 hours.
On Dec 18, the laptop was reinstalled with Goobuntu (Google's custom Ubuntu).
The machine stayed on and checking in to Google normally from the time of the install until Dec 21, when it received a "machine certificate", within a minute of which it was not seen again on Google's networks, despite being configured to connect every 15 minutes (My interpretation? It was off again).
The filing goes on to talk about some Google drive exports of documents that don't necessarily look good for Levandowski.
My purpose here isn't to convince anyone that he's innocent, just to point out that Google's allegations are worded in a way to cast the most suspicion while being technically true. Through the omission of the timeline it sounds like his actions were all taken at once, which looks a little more premeditated, when instead it was over a period of a couple weeks. It's entirely possibly that Levandowski purposefully obfuscated his actions by spreading them out temporally, so this isn't evidence he didn't do what is alleged, but I think it's important people have the facts before making judgments based on Waymo's lawyer's accounting, which is obviously as beneficial to Waymo as possible, as should be expected.
Thanks for writing this up. The court of public opinion IMO should adhere to "innocent until proven guilty," and summaries like yours are the only things that make that possible.
This is a civil suit, not a criminal one, so the standard of judgment at play is "preponderance of evidence", not "innocent until proven guilty beyond a reasonable doubt".
The summary does seem to make it pretty clear which way the preponderance of evidence goes. That'd be an awful lot of coincidences to have all that stuff lining up in one particular way -- it just seems unlikely.
Sure, Google's interpretation is not particularly generous. But even the most charitable reading of the facts would find that Levandowski downloaded the files to an external disk, relatively close to when he left the company.
All of that is bad for Levandowski, but it's unclear if any of those files got used by Uber, which is where the case may very well fizzle out.
> But even the most charitable reading of the facts would find that Levandowski downloaded the files to an external disk
Actually, no. All they have is that a few days after an SVN sync, a USB card reader was attached for 8 hours. There is no evidence presented that he actually copied any files, much less the synced SVN files, to whatever was connected with the USB card reader. He could have plugged it in to copy his personal SSH keys to the machine and left it in until he left for the day for all we know.
There is separate information that he exported a single Google Drive file to a personal device on January 11, titled "Chauffer TL Weekly Updates - Q4 2015". There are further logs about other high level engineers that subsequently left that also exported Google Drive files to personal devices prior to leaving as well.
Can you show me where in the expert testimony this is? I haven't yet found this exact allegation myself. I've seen the media parrot this over and over again.
The expert testimony identified a specific model card reader attached to the computer a full three days later. It didn't say that a memory card was ever inserted into the card reader and mounted a logical volume. Nor did the expert testimony mention any files copied to an external drive. The have an expert testimony with specific details from logs about a card reader being inserted but no specific details about a storage device or files being copied? Does the lack of these details but specificity of other details not strike anyone else as odd?
The only copying of files that were specifically identified in the expert testimony was the copying of about a half dozen files to Google drive. That's it. I'm not saying that there isn't the possibility of wrongdoing, but the expert testimony certainly doesn't support the allegations enough to meet the criteria of "preponderance of evidence" for me at least. The testimony definitely doesn't meet the criteria of being a smoking gun, yet that is how it has been reported.
> Does the lack of these details but specificity of other details not strike anyone else as odd?
Not particularly. There's only so much they can log easily by tying into the system. Card reader insertions are easily tracked through OS level event logs in most operating systems, but generating a log entry for every file copy that happens is quite another level of granularity.
It's sort of like street level cameras. They may catch someone going into a a house or business, but unless you have prior knowledge that there is a camera inthe house or business that the state should have access to, omission of footage of what happened inside does not insinuate that something is being omitted on purpose.
> The only copying of files that were specifically identified in the expert testimony was the copying of about a half dozen files to Google drive.
Yep, and only one of them was by Levandowski. "Chauffer TL Weekly Updates - Q4 2015"
There's only so much that the expert testimony was able to establish. But what it did do was get the judge to authorize more discovery, so Google will apparently get a lot of data from Uber to search through to find their smoking gun, if it exists.
Yeah, I wouldn't expect logs for every file, but I would expect logs for the insertion of a card into the card reader and mounting a logical volume from that card. How big was the card/volume, if any? And if there even was one, was it even big enough to hold the entirety of that repo.
Also, while copying isn't auditable on windows, windows can audit object reads and writes. Were there any logs showing that the directory with the files were read while the card reader was inserted into the machine? It's off by default however. Does anyone know the default audit settings of a new google windows installation to know what folders it turns on logging for if any?
These are all issues and details I would expect to be mentioned in an expert's report if they weren't trying to be selective in the details they provided. Since this expert works for Google, omitting details in Google's favor wouldn't surprise me. I didn't see any statement in the expert's report where they had to make a statement under oath where they declare that they aren't omitting any other details that may be relevant to the court. Without such a declaration, it's possible to be truthful, but deceptive without perjuring yourself.
Despite what you learned as a kid, you can get caught in a lie when you tell the truth. Part of the "game" of adversarial court is trying to get as many legally admissible statements from opposing witnesses as possible. Once enough statements have been entered into evidence, lawyers find contradictions - it doesn't matter how small. Humans don't say the exact same thing every time - it's not too hard to create the appearance of a contradiction where none exists - and sometimes prosecutors get it wrong and think they hear a contradiction where none exists. Good defense lawyers keep their clients (innocent or guilty) out of the witness box as much as possible.
Seeing as how the expert testimony is far from being in the least bit conclusive but allegations were presented as such, it's not hard to see why it is best to say nothing. Every word you utter will be used against you in the least charitable way possible, especially when the court of public opinion already thinks you're guilty.
Taking the fifth is not automatically a sign of guilt despite what some people might think.
As I understand it it's not out of the realm of possibility for a lawyer to advise doing so even for completely innocent clients. It's not hard to get tripped up on the stand and sound guilty even when you aren't.
It's one thing to take the fifth out of an abundance of caution when all it might do is raise some suspicion. It's another thing when doing so is likely to cost you $250MM. It's hard to look at this course of events and conclude that Levandowski probably did nothing wrong.
Part of the problem for Uber is that, as is standard in acquisitions, Uber commissioned a due diligence report to try to determine the odds there was stolen IP involved when they were thinking of buying Levandowski's company.
Now that ought to be evidence that Uber could use in its defense. Instead, Uber is going to extrordinary lengths to try to keep it out of the trial.
Sure. I'm not coming in on the side of Uber, I'm just calling into question the idea of taking Google's initial allegations, and the assumptions that are often made from them, as evidence instead of the actual filing which paints the story slightly differently.
Personally, I suspect we'll eventually fine out that Levandoswki - and others, check the filing - did steal trade secrets.
We found that six weeks before his resignation this former employee, Anthony Levandowski, downloaded over 14,000 highly confidential and proprietary design files for Waymo’s various hardware systems, including designs of Waymo’s LiDAR and circuit board. To gain access to Waymo’s design server, Mr. Levandowski searched for and installed specialized software onto his company-issued laptop. Once inside, he downloaded 9.7 GB of Waymo’s highly confidential files and trade secrets, including blueprints, design files and testing documentation. Then he connected an external drive to the laptop. Mr. Levandowski then wiped and reformatted the laptop in an attempt to erase forensic fingerprints.
Ref: https://medium.com/waymo/a-note-on-our-lawsuit-against-otto-...