Feeds

Feds cuff programmer in alleged trading-ware theft

Say Chinese-born Chicago coder had flight booked

Top 5 reasons to deploy VMware with Tegile

Chunlai Yang, a 49-year old Chinese-born American, has been charged with stealing proprietary software code.

Yang worked for CME Group – which makes trading platforms for commodity derivative markets – as a programmer.

CME has been monitoring his computer use since May. He has worked for the company since 2000.

He appeared in court in Chicago for a detention hearing. He remains in custody until another hearing on Friday, the FT reports.

CME told the paper that many of the files Yang downloaded contained source code which, if handed to competitors, "could cause great economic damage".

Chang was arrested on 2 July at CME's Chicago offices in a raid led by Special Agent Robert D Grant of the Chicago offices of the FBI. He was charged with one count of theft of trade secrets.

According to the FBI, Yang had been in email contact with the assistant director of the Logistics and Trade Bureau for the Zhangjiagang Free Trade Zone. One message included an attachment containing proprietary code.

The Feds also claim Yang had booked a flight to China leaving on 7 July.

A spokesman for CME said: "CME Group places a high value on protecting its intellectual property and trade secrets. As soon as the company became aware of and confirmed the suspicious activities of one of its employees, CME Group cooperated with law enforcement authorities and moved to terminate the individual's employment. As a result, the individual charged with theft of CME Group confidential information is no longer employed by CME Group.  he company has found no evidence that customer information, trading data or required regulatory information was compromised. In light of the pending law enforcement proceedings, CME Group has no further comment on this matter."

Yang faces fines of $250,000 and up to 10 years in prison if found guilty.

The FBI statement is here. ®

Security for virtualized datacentres

More from The Register

next story
'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
More alleged private, nude celeb pics appear online
Home Depot ignored staff warnings of security fail laundry list
'Just use cash', former security staffer warns friends
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Freenode IRC users told to change passwords after securo-breach
Miscreants probably got in, you guys know the drill by now
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
BitTorrent's peer-to-peer chat app Bleep goes live as public alpha
A good day for privacy as invisble.im also reveals its approach to untraceable chats
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.