DuPont Data Theft Shows Insider Risks
Scientist downloaded thousands of documents without being detected
Computerworld - Gary Min worked as a scientist at DuPont for 10 years, focusing on research involving a type of high-performance film. He also covertly used DuPont’s computer systems to steal trade secrets valued at more than $400 million shortly before joining a rival company.
Min’s case, the details of which were unsealed last week by the U.S. attorney’s office in Delaware, is the latest — and perhaps most extreme — example of the dangers posed to corporate data by rogue insiders.
According to the court records, Min pleaded guilty in November to stealing proprietary data from DuPont by illegally downloading or accessing thousands of documents stored in an electronic library. Min, who also uses the first name Yonggang, is scheduled to be sentenced March 29 and faces a maximum of 10 years in prison plus a fine of up to $250,000.
What happened at DuPont vividly shows how trusted insiders can exploit IT weaknesses, as well as the challenges that companies face in stopping people from misusing systems, said Matt Kesner, chief technology officer at law firm Fenwick & West LLP in Mountain View, Calif.
“The old security model looked at the castle and ways to protect it with perimeter defenses,” Kesner said, noting that it made “intuitive sense” to many IT and security managers to implement firewalls, intrusion detection systems and other defenses aimed at preventing outsiders from breaking in. But that model is inadequate for dealing with insider threats, Kesner said.
“Frankly, we all have to actively stop thinking of insider vs. outsider” and focus on improving access controls for all users, he said. “It means looking at each and every person and machine as an island and deciding what rights and access each person and machine needs or doesn’t need.”
According to the information released last week, Min downloaded about 22,000 document abstracts from DuPont’s Electronic Data Library (EDL) server and accessed another 16,700 full-text PDF files. The various documents covered most of the company’s major products and technologies, including some that were still in the research and development stage.
The illegal activity occurred during a five-month period just prior to Min’s departure from DuPont in December 2005, the U.S. attorney’s office said. When the downloading began that August, Min was in active job discussions with Victrex PLC, a company based in Thornton Cleveleys, England, that he signed on with in October 2005 but didn’t join until the following January.
Although Min downloaded or accessed about 15 times more documents than the next-heaviest user of the EDL did during the period in question, his activities
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Global Growing Pains: Tapping into B2B Integration Services to Overcome Global Expansion Challenges A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How...
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!