U.S. prosecutors have outlined a scheme that moved or attempted to move at least $160 million (C$215 million) in export‑controlled Nvidia GPUs to China. The case, unsealed on December 8, centres on a Texas guilty plea and parallel arrests in New York and Virginia tied to a wider investigation called Operation Gatekeeper.
Court documents say shipments were mislabelled, destinations were disguised, and funds flowed from buyers in China. The activity allegedly ran through U.S. warehouses, where labels were removed and replaced, then goods were routed to the People’s Republic of China and Hong Kong. The network, investigators say, targeted high‑end H100 and H200 chips used in advanced AI and data centres.
Enforcement details and Canadian link
According to the December 8 filing, one defendant and his Houston firm pleaded guilty in October, admitting to falsified paperwork and misdeclared exports. The government says the wider network used intermediaries and straw purchasers, with more than $50 million (C$67 million) in wire transfers from China funding procurement.
Prosecutors also allege relabelling of GPUs with a fictitious brand, SANDKYAN, and misclassification as generic parts to avoid licence triggers under U.S. export rules. A Canadian citizen based in Mississauga, Ontario, is among those charged in the related case, adding a cross‑border dimension to compliance exposure. “We ask our private sector partners to remain vigilant to this increasing threat as our adversaries try to match U.S. artificial intelligence breakthroughs,” said John A. Eisenberg, Assistant Attorney General for National Security.
The December action follows a November indictment in Florida that describes a separate, smaller pipeline using a Tampa front company to source servers and GPUs. In that case, defendants allegedly shipped 400 A100 units between October 2024 and January 2025, and tried to send H100‑equipped systems and H200 chips before law enforcement intervened.
The filings suggest layered transshipment through Malaysia and Thailand to mask ultimate destinations. The pattern across the cases is consistent, authorities argue, with paperwork fraud and concealed end users to defeat licensing. Case timelines span late 2023 to late 2025, indicating sustained pressure on enforcement teams.
Implications for data centre supply chains
For data centre builders and cloud operators, the allegations highlight procurement and logistics as key points of risk. High‑value accelerators are easy to conceal within larger shipments, yet they demand strict licence checks and documentation trails. U.S. actions can affect Canadian projects when cross‑border vendors, integrators, or financing touch controlled hardware. Audits, chain‑of‑custody records, and real‑time part verification reduce exposure to diversion and seized inventory. Short lead times help, but compliance checkpoints matter more.
Market effects may be uneven. Any seizures or delays tighten already constrained supply of advanced accelerators, which can raise build timelines and integration costs. Substitution with approved parts often requires software and thermal redesigns, creating knock‑on impacts for schedules. Insurance and lender covenants may also tighten around export‑control warranties and supplier vetting.
“Thanks to the dedicated investigative work by our law enforcement partners, these defendants who wrongfully exported this sensitive technology are facing justice,” said U.S. Attorney Gregory W. Kehoe.
The recent filings suggest enforcement will favour swift interim seizures while cases proceed, a stance that can cascade into project delays if parts are detained.
