Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Tracking & Law Enforcement

Former Goldman Programmer Gets 8 Years in Prison for Stealing Firm’s Computer Code

A former Goldman Sachs programmer responsible for developing programs that power the firm’s high-frequency trading systems – a key to millions in profits for the Wall Street giant – was sentenced in Manhattan federal court to 97 months in prison after being found guilty of theft of trade secrets and one count of transportation of stolen property.

A former Goldman Sachs programmer responsible for developing programs that power the firm’s high-frequency trading systems – a key to millions in profits for the Wall Street giant – was sentenced in Manhattan federal court to 97 months in prison after being found guilty of theft of trade secrets and one count of transportation of stolen property.

Sergey Aleynikov, 40 years-old, worked at Goldman Sachs from May 2007 to June 2009 as a computer programmer, working on programs to run the firm’s high-frequency trading across various commodities and equities markets. Goldman Sachs acquired the high-frequency trading system in 1999, when it acquired Hull Trading Company, for approximately $500 million. An expensive system which generates massive profits for the firm, it’s certainly something the company puts every effort into to protect.

According to case related documents, in April 2009, Aleynikov resigned from Goldman Sachs after accepting a job at Teza Technologies, a newly-formed company in Chicago, Illinois. He was hired to develop Teza’s own version of a computer platform that would allow Teza to engage in high-frequency trading.

On his last day of employment at Goldman Sachs (June 5, 2009) Aleynikov’s copied substantial portions of Goldman’s proprietary computer code for its trading platform to an outside computer server in Germany. He encrypted the files and transferred them over the Internet without informing Goldman Sachs. After transferring the files, he deleted the program he used to encrypt the files and deleted his computer’s “bash history,” which records the most recent commands executed on his computer.

Case documents also say that throughout his employment at Goldman Sachs, Aleynikov transferred thousands of computer code files related to the firm’s proprietary trading program from the firm’s computers to his home computers, without the knowledge or authorization of Goldman Sachs.

On July 2, 2009, Aleynikov flew to Chicago to attend meetings at Teza’s offices, bringing with him his laptop computer and another storage device, each of which contained Goldman Sachs’s proprietary source code. He was arrested on July 3, 2009, as he arrived at Newark Airport following that visit.

The Economic Espionage Act makes the theft or misappropriation of a trade secret a federal crime.

Advertisement. Scroll to continue reading.

In addition to the prison sentence, Judge Cote ordered Aleynikov to serve three years of supervised release following his prison sentence and ordered him to pay a $12,500 fine.

During the sentencing proceeding, Judge Cote said, “[Aleynikov’s] conduct deserves a significant sentence because the scope of his theft was audacious—motivated solely by greed, and it was characterized by supreme disloyalty to his employer.”

Other recent successful prosecutions involving theft of trade secrets include a Chinese National pleading guilty to stealing Ford trade secrets, and a former technical operations associate in Bristol-Myers Squibb’s management training program on theft of trade secrets from the company.

With cases like these becoming more common, it shows that corporate information is increasingly under threat and clearly shows the need for improved separation and isolation of information.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Ransomware

The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.

Cybercrime

Spanish Court agreed to extradite Joseph James O’Connor to he U.S., who allegedly took part in the July 2020 hacking of Twitter accounts of...

Ransomware

US government reminds the public that a reward of up to $10 million is offered for information on cybercriminals, including members of the Hive...

Privacy

Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...

Cybercrime

A hacker who reportedly posed as the CEO of a financial institution claims to have obtained access to the more than 80,000-member database of...

Application Security

Virtualization technology giant Citrix on Tuesday scrambled out an emergency patch to cover a zero-day flaw in its networking product line and warned that...