Feeds

Feds cuff programmer in alleged trading-ware theft

Say Chinese-born Chicago coder had flight booked

Secure remote control for conventional and virtual desktops

Chunlai Yang, a 49-year old Chinese-born American, has been charged with stealing proprietary software code.

Yang worked for CME Group – which makes trading platforms for commodity derivative markets – as a programmer.

CME has been monitoring his computer use since May. He has worked for the company since 2000.

He appeared in court in Chicago for a detention hearing. He remains in custody until another hearing on Friday, the FT reports.

CME told the paper that many of the files Yang downloaded contained source code which, if handed to competitors, "could cause great economic damage".

Chang was arrested on 2 July at CME's Chicago offices in a raid led by Special Agent Robert D Grant of the Chicago offices of the FBI. He was charged with one count of theft of trade secrets.

According to the FBI, Yang had been in email contact with the assistant director of the Logistics and Trade Bureau for the Zhangjiagang Free Trade Zone. One message included an attachment containing proprietary code.

The Feds also claim Yang had booked a flight to China leaving on 7 July.

A spokesman for CME said: "CME Group places a high value on protecting its intellectual property and trade secrets. As soon as the company became aware of and confirmed the suspicious activities of one of its employees, CME Group cooperated with law enforcement authorities and moved to terminate the individual's employment. As a result, the individual charged with theft of CME Group confidential information is no longer employed by CME Group.  he company has found no evidence that customer information, trading data or required regulatory information was compromised. In light of the pending law enforcement proceedings, CME Group has no further comment on this matter."

Yang faces fines of $250,000 and up to 10 years in prison if found guilty.

The FBI statement is here. ®

Intelligent flash storage arrays

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.