05:30 PM
Connect Directly

Chinese National Arrested For Source Code Theft

The information was taken from a New Jersey company that develops, implements, and supports software for environmental applications.

A Chinese citizen on a work visa in the United States was arrested by the FBI last week for allegedly revealing proprietary software code owned by his unidentified U.S. employer to a Chinese government agency.

Yan Zhu, 31, of Lodi, N.J. -- also known as "Westerly Zhu" -- was arrested on charges of theft of trade secrets, conspiracy, wire fraud, and theft of honest services fraud.

"Crimes of this nature do not get much public attention," FBI Special Agent in Charge Weysan Dun said in a statement. "No one is shot, there is no crime scene, no prominent public figures are involved. However, this is an act of economic violence -- a paper crime that robs the victim company of the resources they expended to develop a product."

Dun said that white-collar crimes of this sort are clearly dangerous to America's economic infrastructure. "If American dollars are spent on research and development of a product, and then that product or research is taken without any compensation to American companies, the value of American companies and American products is significantly reduced in the global marketplace," he said.

David Schafer, the assistant federal public defender representing Zhu, declined to comment or to identify Zhu's former U.S. employer.

According to the criminal complaint, Zhu's former employer is an unnamed company based in Mercer County, N.J., that develops, implements, and supports software for environmental applications. One of its applications is an environmental information management portal for the Chinese market.

Zhu, who holds a Ph.D. from Columbia University in geo-environmental engineering, was hired by the U.S. company around April 2006 as a senior environmental engineer and signed a confidentiality agreement.

In July 2007, the U.S. company signed a contract with Shanxi Province, China, to provide its software to the local Environmental Protection Administration ("Shanxi EPA"). The contract called for four payments totaling about $1.5 million -- a down payment and three subsequent payments following the installation of module 1, modules 2 and 3, and module 4.

In November 2007, the Shanxi EPA made the down payment of about $440,000. By March 2008, all four modules were installed, but the U.S. company never received further payment.

The U.S. company subsequently recognized the software it had provided to Shanxi Province had been altered, which would require access to the company's source code. The company also noticed that a Chinese company set up to serve as a payment conduit for the deal was now listed on a Shanxi Web site as a vendor of environmental software.

The complaint alleges that Zhu e-mailed his company's database and more than 2,000 pages of source code to co-conspirators in China and that the individuals have been selling the U.S. company's software to Chinese government agencies without authorization.

In its 2008 report to Congress, the U.S.-China Economic and Security Review Commission warned that "China is targeting U.S. government and commercial computers for espionage."

In 2007, the group said, "Chinese espionage activities in the United States are so extensive that they comprise the single greatest risk to the security of American technologies."

China, however, is not alone in seeking to obtain U.S. technology through espionage. Many nationals of other countries and U.S. citizens have been involved in technology theft or illegal technology exports.

Attend a Webcast on why bad security breaches keep happening to good organizations. It happens Wednesday, April 15. Find out more and register.

The article was edited on 4/15 to correct the amount Shanxi EPA paid in Nov. 2007.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
According to industry estimates, about a million new IT security jobs will be created in the next two years but there aren't enough skilled professionals to fill them. On top of that, there isn't necessarily a clear path to a career in security. Dark Reading Executive Editor Kelly Jackson Higgins hosts guests Carson Sweet, co-founder and CTO of CloudPassage, which published a shocking study of the security gap in top US undergrad computer science programs, and Rodney Petersen, head of NIST's new National Initiative for Cybersecurity Education.