Feeds

Feds cuff programmer in alleged trading-ware theft

Say Chinese-born Chicago coder had flight booked

Seven Steps to Software Security

Chunlai Yang, a 49-year old Chinese-born American, has been charged with stealing proprietary software code.

Yang worked for CME Group – which makes trading platforms for commodity derivative markets – as a programmer.

CME has been monitoring his computer use since May. He has worked for the company since 2000.

He appeared in court in Chicago for a detention hearing. He remains in custody until another hearing on Friday, the FT reports.

CME told the paper that many of the files Yang downloaded contained source code which, if handed to competitors, "could cause great economic damage".

Chang was arrested on 2 July at CME's Chicago offices in a raid led by Special Agent Robert D Grant of the Chicago offices of the FBI. He was charged with one count of theft of trade secrets.

According to the FBI, Yang had been in email contact with the assistant director of the Logistics and Trade Bureau for the Zhangjiagang Free Trade Zone. One message included an attachment containing proprietary code.

The Feds also claim Yang had booked a flight to China leaving on 7 July.

A spokesman for CME said: "CME Group places a high value on protecting its intellectual property and trade secrets. As soon as the company became aware of and confirmed the suspicious activities of one of its employees, CME Group cooperated with law enforcement authorities and moved to terminate the individual's employment. As a result, the individual charged with theft of CME Group confidential information is no longer employed by CME Group.  he company has found no evidence that customer information, trading data or required regulatory information was compromised. In light of the pending law enforcement proceedings, CME Group has no further comment on this matter."

Yang faces fines of $250,000 and up to 10 years in prison if found guilty.

The FBI statement is here. ®

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.