Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Former Goldman Sachs Programmer Found Guilty After Stealing Computer Code

A former Goldman Sachs programmer responsible for developing programs that power the firm’s high-frequency trading systems – a key to millions in profits for the Wall Street giant – was found guilty last week by a jury in Manhattan federal court of one count of theft of trade secrets and one count of transportation of stolen property in interstate and foreign commerce.

A former Goldman Sachs programmer responsible for developing programs that power the firm’s high-frequency trading systems – a key to millions in profits for the Wall Street giant – was found guilty last week by a jury in Manhattan federal court of one count of theft of trade secrets and one count of transportation of stolen property in interstate and foreign commerce.

Sergey Aleynikov, 40 years-old, worked at Goldman Sachs from May 2007 to June 2009 as a computer programmer, working on programs to run the firm’s high-frequency trading across various commodities and equities markets. Goldman Sachs acquired the high-frequency trading system in 1999, when it acquired Hull Trading Company, for approximately $500 million. An expensive system which generates massive profits for the firm, it’s certainly something the company puts every effort into to protect.

According to case related documents, in April 2009, Aleynikov resigned from Goldman Sachs after accepting a job at Teza Technologies, a newly-formed company in Chicago, Illinois. He was hired to develop Teza’s own version of a computer platform that would allow Teza to engage in high-frequency trading.

On his last day of employment at Goldman Sachs (June 5, 2009) Aleynikov’s copied substantial portions of Goldman’s proprietary computer code for its trading platform to an outside computer server in Germany. He encrypted the files and transferred them over the Internet without informing Goldman Sachs. After transferring the files, he deleted the program he used to encrypt the files and deleted his computer’s “bash history,” which records the most recent commands executed on his computer.

Case documents also say that throughout his employment at Goldman Sachs, Aleynikov transferred thousands of computer code files related to the firm’s proprietary trading program from the firm’s computers to his home computers, without the knowledge or authorization of Goldman Sachs.

On July 2, 2009, Aleynikov flew to Chicago to attend meetings at Teza’s offices, bringing with him his laptop computer and another storage device, each of which contained Goldman Sachs’s proprietary source code. He was arrested on July 3, 2009, as he arrived at Newark Airport following that visit.

The Economic Espionage Act makes the theft or misappropriation of a trade secret a federal crime. “As today’s guilty verdict demonstrates, we will use the full force of the federal law to prosecute those who steal valuable and proprietary information from their employers, whether those firms are on Wall Street or Main Street. The brazen theft of intellectual property by Sergey Aleynikov had the potential to cause serious harm to the company, and now he will pay for his crimes. We will continue working with our law enforcement partners to investigate and prosecute corrupt professionals who exploit their access to employer’s secrets,” said Preet Bharara, Manhattan U.S. Attorney.

The trial lasted two weeks – Peter Lattman at the New York Times Dealbook wrote a good story on the case as it kicked off.

Advertisement. Scroll to continue reading.

Scheduled to be sentenced on March 18, 2011, Aleynikov faces a maximum of 15 years in prison.

Other recent successful prosecutions involving theft of trade secrets include a Chinese National pleading guilty to stealing Ford trade secrets, and a former technical operations associate in Bristol-Myers Squibb’s management training program on theft of trade secrets from the company.

With cases like these becoming more common, it shows that corporate information is increasingly under threat and clearly shows the need for improved separation and isolation of information.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is founder and director of several leading cybersecurity industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

DARPA veteran Dan Kaufman has joined Badge as SVP, AI and Cybersecurity.

Kelly Shortridge has been promoted to VP of Security Products at Fastly.

After the passing of Amit Yoran, Tenable has appointed Steve Vintz and Mark Thurmond as co-CEOs.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.