Feeds

Ex-Goldman Sachs coder cuffed on fresh 'source theft' charges

Programmer cleared of wrongdoing faces new charges

Protecting against web application threats using SSL

A Goldman Sachs programmer cleared six months ago of stealing the source code to the bank’s high-frequency trading system has been re-arrested and charged.

The Manhattan district attorney has now accused Sergey Aleynikov, 42, of unlawfully using secret scientific material and unlawfully duplicating computer-related material.

In February Aleynikov overturned a conviction on federal charges that claimed he stole trade secrets from his employer, mega-bank Goldman Sachs. During the appeal hearing, his lawyer Kevin Marino argued Aleynikov had been incorrectly charged under the Economic Espionage Act (EEA).

The appeals court ruled in Aleynikov's favour, finding that taking source code is not a crime under federal law, which instead makes it illegal to steal trade secrets, and that the code didn’t qualify as stolen goods under another federal law.

Aleynikov, a naturalized US citizen from Russia, worked for Goldman Sachs between 2007 and 2009, and built software that takes advantage of small arbitrage opportunities in stock prices by placing millions of trades in a matter of seconds.

Aleynikov was recruited by trading firm Teza Technologies to develop similar high-frequency trading software and he gave notice to Goldman Sachs in April 2009.

The NY state complaint alleges Aleynikov transferred “hundreds of thousands of lines of source code for Goldman Sachs’ high-frequency trading system to a foreign server; that code included trading algorithms used to determine the value of stock options".

In the original case, brought by the US government in 2009, Aleynikov said he thought he was only taking open-source code, and hadn’t realised any proprietary code was included. That defence was rejected by the trial judge and Aleynikov was sentenced in December 2010 to eight years in prison, with three under supervised release and a $12,500 fine.

Commenting on the latest charges, DA Cyrus Vance said on Thursday: “This code is so highly confidential that it is known in the industry as the firm’s ‘secret sauce'… employees who exploit their access to sensitive information should expect to face criminal prosecution in New York State in appropriate cases." ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.