Former DHS Acting IT Chief Convicted in Software, Database Theft SchemeFormer DHS Acting IT Chief Convicted in Software, Database Theft Scheme
Former DHS employees targeted confidential, proprietary software and personally identifying information (PII) for hundreds of thousands of federal employees.
April 11, 2022
The former acting branch chief of the US Department of Homeland Security's Information Technology Division today was convicted on several federal charges related to pilfering government proprietary software and databases.
Murali Y. Venkata, 56, of Aldie, Va., was found guilty of conspiracy to defraud the US government, theft of government property, wire fraud, aggravated identity theft, and obstruction. He had worked with two other former government officials — Charles Edwards, former acting inspector general of DHS-OIG, and Sonal Patel, also of DHS-OIG — who pleaded guilty previously in the scheme.
The three former DHS officials conspired to steal sensitive, proprietary software from the feds as well as personally identifying information for hundreds of thousands of federal workers, according to a Justice Department press announcement today.
Edwards and Patel separately pleaded guilty in 2022 and 2019, respectively, for pilfering US government property in order to create a commercial case management system to sell to government agencies. Venkata stole source code and databases from DHS-OIG and helped Edwards install servers in his home for software developers in India to use to create a commercial version of the stolen software.
About the Author(s)
Tricks to Boost Your Threat Hunting GameNov 06, 2023
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
The State of Supply Chain Threats
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Everything You Need to Know About DNS Attacks
How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
Maximize the Human Potential of Your SOC
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization