Connect with us

Hi, what are you looking for?



Chinese Programmer Charged With Stealing Source Code from Federal Reserve Bank of New York

A Chinese computer programmer was arrested by U.S. authorities in New York on Wednesday, on charges that he stole proprietary source code while working on a project at the Federal Reserve Bank of New York.

A Chinese computer programmer was arrested by U.S. authorities in New York on Wednesday, on charges that he stole proprietary source code while working on a project at the Federal Reserve Bank of New York.

FBI Arrests Bo Zhang for Stealing Source CodeBo Zhang, 32, of Queens, New York, has been charged with stealing source code from a system known as the “Government-Wide Accounting and Reporting Program” (GWA), a software system owned by the Department of the Treasury that is used mainly to manage central accounting and reporting functions and processes associated with budget execution, accountability, and asset management.

Among other things, the GWA provides federal agencies with an account statement—similar to bank statements provided to bank customers—of the agencies’ account balances with the United States Treasury. The United States has spent approximately $9.5 million to develop the system.

Zhang worked as a contract employee developing a specific portion of the GWA’s source code at the Federal Reserve Bank of New York where the source code is maintained in an access-controlled electronic environment.

The complaint alleges that in the summer of 2011, Zhang stole the GWA code, something he admitted to in July 2011.

Related Reading: Former Goldman Sachs Programmer Found Guilty After Stealing Computer Code

According to the complaint, while working at the FRBNY, he accessed and copied the code onto a hard drive at the FRBNY, then copied it onto an FRBNY-owned external hard drive. He then connected that external hard-drive to his private office computer, his home computer, and his laptop.

Zhang said that he used the GWA Code in connection with a private business he ran training individuals in computer programming.

“Zhang took advantage of the access that came with his trusted position to steal highly sensitive proprietary software,” said FBI Assistant Director in Charge Janice K. Fedarcyk. “His intentions with regard to that software are immaterial. Stealing it and copying it threatened the security of vitally important source code.”

Advertisement. Scroll to continue reading.

Zhang faces up to 10 years in prison and a fine up to $250,000, or twice the financial gain derived from the offense or twice the gross financial loss to the victims.

“As today’s case demonstrates, our cyber infrastructure is vulnerable not only to cybercriminals and hackers, but also alleged thieves like Bo Zhang who used his position as a contract employee to steal government intellectual property,” commented U.S. Attorney, Preet Bharara in a statement. “Fighting cyber crime is one of the top priorities of this office and we will aggressively pursue anyone who puts our computer security at risk.”

Related Stories:

• Man Pleads Guilty to Hacking Neighbor’s Wireless, Sending Threats against Vice President

• Former Goldman Sachs Programmer Found Guilty After Stealing Computer Code

 Chinese National Pleads Guilty to Stealing Ford Trade Secrets

• Akamai Employee Arrested, Accused of Trying to Sell Information to Foreign Government

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Gain valuable insights from industry professionals who will help guide you through the intricacies of industrial cybersecurity.


Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.


Expert Insights

Related Content


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.