Feeds

Feds cuff programmer in alleged trading-ware theft

Say Chinese-born Chicago coder had flight booked

The Power of One eBook: Top reasons to choose HP BladeSystem

Chunlai Yang, a 49-year old Chinese-born American, has been charged with stealing proprietary software code.

Yang worked for CME Group – which makes trading platforms for commodity derivative markets – as a programmer.

CME has been monitoring his computer use since May. He has worked for the company since 2000.

He appeared in court in Chicago for a detention hearing. He remains in custody until another hearing on Friday, the FT reports.

CME told the paper that many of the files Yang downloaded contained source code which, if handed to competitors, "could cause great economic damage".

Chang was arrested on 2 July at CME's Chicago offices in a raid led by Special Agent Robert D Grant of the Chicago offices of the FBI. He was charged with one count of theft of trade secrets.

According to the FBI, Yang had been in email contact with the assistant director of the Logistics and Trade Bureau for the Zhangjiagang Free Trade Zone. One message included an attachment containing proprietary code.

The Feds also claim Yang had booked a flight to China leaving on 7 July.

A spokesman for CME said: "CME Group places a high value on protecting its intellectual property and trade secrets. As soon as the company became aware of and confirmed the suspicious activities of one of its employees, CME Group cooperated with law enforcement authorities and moved to terminate the individual's employment. As a result, the individual charged with theft of CME Group confidential information is no longer employed by CME Group.  he company has found no evidence that customer information, trading data or required regulatory information was compromised. In light of the pending law enforcement proceedings, CME Group has no further comment on this matter."

Yang faces fines of $250,000 and up to 10 years in prison if found guilty.

The FBI statement is here. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.