Akamai employee tried to sell secrets to Israel
A staffer in the finance department tried to sell client information, contracts and even an employee list
IDG News Service - A 43-year-old former Akamai employee has pleaded guilty to espionage charges after offering to hand over confidential information about the Web acceleration company to an agent posing as an Israeli consular official in Boston.
Starting in September 2007, Elliot Doxer played an elaborate 18-month-long game of cloak-and-dagger with James Cromer, a man he thought was an Israeli intelligence officer. He handed over pages and pages of confidential data to Cromer, providing a list of Akamai's clients and contracts, information about the company's security practices, and even a list of 1,300 Akamai employees, including mobile numbers, departments and e-mail addresses.
Doxer delivered the information to a dead drop box, a predetermined location set up by Cromer where both of them could drop off documents for each other without actually meeting.
His motivation was to help Israel and to get information on his son and estranged wife, who lived outside the U.S., prosecutors said in court filings.
Unbeknownst to Doxer, his Israeli spy was actually a special agent with the counterintelligence squad at the U.S. Federal Bureau of Investigation's Pittsburgh field office. In October 2010, Doxer was arrested and charged with committing foreign economic espionage. He pleaded guilty on Tuesday, becoming only the eighth person ever to be prosecuted in the U.S. for trying to sell corporate secrets to foreign governments.
According to Akamai, there's no evidence that Doxer ever managed to sell his secrets to anyone other than federal agents. Doxer's lawyer didn't immediately respond to messages seeking comment Tuesday.
Doxer worked in the finance department at Akamai's Boston headquarters. Apparently out of the blue, he decided to send an e-mail to Israel's Boston consulate on June 22, 2006, writing, "I am a jewish american who lives in Boston. I know you are always looking for information and i am offering the little i may have."
When Cromer contacted him a few years later, Doxer quickly began delivering information. He visited the dead drop box 62 times in the next 18 months, authorities said. He asked for $3,000 for the data.
He also asked for information about his son, and he made this rather ominous comment about his estranged wife: "His mother is a terrible human being and has caused me tremendous suffering. Not enough bad things can happen to her if you know what I mean."
Doxer faces 15 years in prison on the charges.
- Arrests made after international cyber-ring targets StubHub
- International police operation disrupts Shylock banking Trojan
- Spamhaus pushes for arrests of alleged DDoS participants
- Accused Russian point-of-sale hacker arrested, will face U.S. charges
- No-IP regains control of some domains wrested by Microsoft
- Microsoft legal action cramping other hacking campaigns, Kaspersky says
- Microsoft admits technical error in IP takeover, but No-IP still down
- QuickPoll: Why hasn't Windows XP come under attack from hackers?
- Cybercrime losses top $400 billion worldwide
- U.S., foreign agents disrupt Gamover Zeus botnet
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to... All Cybercrime and Hacking White Papers | Webcasts