Judge denies bail for ex-trader accused of code theft
Samarth Agrawal, formerly with Societe Generale, is charged with stealing code related to a high-speed trading system
Computerworld - A federal judge in New York has denied bail to a former trader at Societe Generale who was arrested earlier this week for allegedly stealing proprietary computer code used in a high-speed trading system.
U.S. Magistrate Judge Michael Dolinger ordered Samarth Agrawal, 26 to remain jailed, citing flight risk concerns if Agrawal were to be released on bail.
Agrawal has been in custody since Monday when he was arrested on one count of theft of trade secrets. If convicted, Agrawal, who is a native of India, faces a maximum of 10 years in prison.
Agrawal is the second individual to be nabbed in the past year for attempting to steal proprietary information involving high-speed trading systems. Last July, Sergey Aleynikov, a software developer working for Goldman Sachs, was arrested on charges that he stole 32 megabytes of proprietary code used in the company's high-speed, high-volume trading system.
Agrawal worked at Societe Generale's New York offices initially as a quantitative analyst and later as a trader in the company's High Frequency Trading Group (HFTG).
According to the official complaint against him, the code that Agrawal is alleged to have stolen took Societe General several years and millions of dollars to develop.
The company took several measures to protect the code, including by dividing it into multiple smaller 'units', limiting access to only those employees whose jobs require it and then only to specific units, as well as preventing the code from being downloaded to portable storage devices such as USB thumb drives.
Agrawal's alleged theft of the code began in June 2009, about two months after he was promoted to the position of a trader within Societe Generale's HFTG. As a trader, Agrawal was granted access to the trading algorithms on one unit of the proprietary code.
According to the complaint, Agrawal is alleged to have used that access to copy the entire proprietary code in that unit, as well as another unit that he was not officially allowed access to. He is also alleged to have captured several screen shots of the entire file system structure of the unit containing the code.
The copied documents, which amounted to hundreds of pages of proprietary code, some of which were stored as Microsoft Word documents, were later printed out by Agrawal the next day, which happened to be a Saturday.
Though Agrawal was supposed to inform his supervisor about his presence in the office on a weekend, he did not inform anybody that he had been there.
On two separate occasions thereafter, once in August and the other in September, Agrawal is alleged to printed out hundreds more pages of proprietary code from the two units he had accessed and copied data from in June.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts