DuPont Data Theft Shows Insider Risks
Scientist downloaded thousands of documents without being detected
Computerworld - Gary Min worked as a scientist at DuPont for 10 years, focusing on research involving a type of high-performance film. He also covertly used DuPont’s computer systems to steal trade secrets valued at more than $400 million shortly before joining a rival company.
Min’s case, the details of which were unsealed last week by the U.S. attorney’s office in Delaware, is the latest — and perhaps most extreme — example of the dangers posed to corporate data by rogue insiders.
According to the court records, Min pleaded guilty in November to stealing proprietary data from DuPont by illegally downloading or accessing thousands of documents stored in an electronic library. Min, who also uses the first name Yonggang, is scheduled to be sentenced March 29 and faces a maximum of 10 years in prison plus a fine of up to $250,000.
What happened at DuPont vividly shows how trusted insiders can exploit IT weaknesses, as well as the challenges that companies face in stopping people from misusing systems, said Matt Kesner, chief technology officer at law firm Fenwick & West LLP in Mountain View, Calif.
“The old security model looked at the castle and ways to protect it with perimeter defenses,” Kesner said, noting that it made “intuitive sense” to many IT and security managers to implement firewalls, intrusion detection systems and other defenses aimed at preventing outsiders from breaking in. But that model is inadequate for dealing with insider threats, Kesner said.
“Frankly, we all have to actively stop thinking of insider vs. outsider” and focus on improving access controls for all users, he said. “It means looking at each and every person and machine as an island and deciding what rights and access each person and machine needs or doesn’t need.”
According to the information released last week, Min downloaded about 22,000 document abstracts from DuPont’s Electronic Data Library (EDL) server and accessed another 16,700 full-text PDF files. The various documents covered most of the company’s major products and technologies, including some that were still in the research and development stage.
The illegal activity occurred during a five-month period just prior to Min’s departure from DuPont in December 2005, the U.S. attorney’s office said. When the downloading began that August, Min was in active job discussions with Victrex PLC, a company based in Thornton Cleveleys, England, that he signed on with in October 2005 but didn’t join until the following January.
Although Min downloaded or accessed about 15 times more documents than the next-heaviest user of the EDL did during the period in question, his activities
- EndPoint Interactive eGuide In this eGuide, Network World, Computerworld, and CIO examine two endpoint trends - BYOD and collaboration - and offer tips and advice on...
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Surescripts Case Study- Securing Keys and Certificates Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its...
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!