Jeremy S. Wu, Ph.D.
Jeremy S. Wu, Ph.D.
  • Home
  • About
    • Personal
  • Activities
    • Regency at McLean
  • Big Data
    • Maps
      • Asian Americans by CD 2015
      • Asian Americans by CD 2014
      • Asian Americans by CD 2013
      • Berkeley Earth
      • Chinese Smart Cities
    • 清华论坛
  • Blogs
  • Justice
    • 1882 Timeline
    • 2020 Census
    • APA FISA Watch
    • Fed Cases
    • Profiling

Jeremy S. Wu, Ph.D.

胡善庆博士

Jeremy S. Wu, Ph.D.
  • Home
  • About
    • Personal
  • Activities
    • Regency at McLean
  • Big Data
    • Maps
      • Asian Americans by CD 2015
      • Asian Americans by CD 2014
      • Asian Americans by CD 2013
      • Berkeley Earth
      • Chinese Smart Cities
    • 清华论坛
  • Blogs
  • Justice
    • 1882 Timeline
    • 2020 Census
    • APA FISA Watch
    • Fed Cases
    • Profiling

DOJ201606-002

  • NSD201606

Theft Of Valuable Source Code

On June 14, 2016, Jiaqiang Xu was charged in the Southern District of New York in a six-count superseding indictment with economic espionage and theft of trade secrets, in connection with Xu’s theft of proprietary source code from his former employer, with the intent to benefit the National Health and Family Planning Commission of the People’s Republic of China. Xu was initially arrested by the FBI on Dec. 7, 2015, and was previously charged on Jan. 6, 2016 by indictment with one count of theft of trade secrets. According to court documents, from November 2010 to May 2014, Xu worked as a developer for a particular U.S. company (the “Victim Company”). As a developer, Xu enjoyed access to certain proprietary software (the “Proprietary Software”), as well as that software’s underlying source code (the “Proprietary Source Code”). The Proprietary Software is a clustered file system developed and marketed by the Victim Company in the U.S. and other countries. A clustered file system facilitates faster computer performance by coordinating work among multiple servers. The Victim Company takes significant precautions to protect the Proprietary Source Code as a trade secret. Among other things, the Proprietary Source Code is stored behind a company firewall and can only be accessed by a small subset of the Victim Company’s employees. Before receiving Proprietary Source Code access, Victim Company employees must first request and receive approval from a particular Victim Company official. Victim Company employees must also agree in writing at both the outset and the conclusion of their employment that they will maintain the confidentiality of any proprietary information. The Victim Company takes these and other precautions in part because the Proprietary Software and the Proprietary Source Code are economically valuable, which value depends in part on the Proprietary Source Code’s secrecy. In May 2014, Xu voluntarily resigned from the Victim Company. Xu subsequently communicated with one undercover law enforcement officer (“UC-1”), who posed as a financial investor aiming to start a large-data storage technology company, and another undercover law enforcement officer (“UC-2”), who posed as a project manager, working for UC-1. In these communications, Xu discussed his past experience with the Victim Company and indicated that he had experience with the Proprietary Software and the Proprietary Source Code. On March 6, 2015, Xu sent UC-1 and UC-2 a code, which Xu stated was a sample of Xu’s prior work with the Victim Company. A Victim Company employee (“Employee-1”) later confirmed that the code sent by Xu included proprietary Victim Company material that related to the Proprietary Source Code. Xu subsequently informed UC-2 that Xu was willing to consider providing UC-2’s company with the Proprietary Source Code as a platform for UC-2’s company to facilitate the development of UC-2’s company’s own data storage system. Xu informed UC-2 that if UC-2 set up several computers as a small network, then Xu would remotely install the Proprietary Software so that UC-1 and UC-2 could test it and confirm its functionality. In or around early August 2015, the FBI arranged for a computer network to be set up, consistent with Xu’s specifications. Files were then remotely uploaded to the FBI-arranged computer network (the “Xu Upload”). Thereafter, on or about August 26, 2015, Xu and UC-2 confirmed that UC-2 had received the Xu Upload. In September 2015, the FBI made the Xu Upload available to a Victim Company employee who has expertise regarding the Proprietary Software and the Proprietary Source Code (“Employee-2”). Based on Employee-2’s analysis of technical features of the Xu Upload, it appeared to Employee-2 that the Xu Upload contained a functioning copy of the Proprietary Software. It further appeared to Employee-2 that the Xu Upload had been built by someone with access to the Proprietary Source Code who was not working within the Victim Company or otherwise at the Victim Company’s direction. On December 7, 2015, Xu met with UC-2 at a hotel in White Plains, New York (the “Hotel”). Xu stated, in sum and substance, that Xu had used the Proprietary Source Code to make software to sell to customers, that Xu knew the Proprietary Source Code to be the product of decades of work on the part of the Victim Company, and that Xu had used the Proprietary Source Code to build a copy of the Proprietary Software, which Xu had uploaded and installed on the UC Network (i.e., the Xu Upload). Xu also indicated that Xu knew the copy of the Proprietary Software that Xu had installed on the UC Network contained information identifying the Proprietary Software as the Victim Company’s property, which could reveal the fact that the Proprietary Software had been built with the Proprietary Source Code without the Victim Company’s authorization. Xu told UC-2 that Xu could take steps to prevent detection of the Proprietary Software’s origins – i.e., that it had been built with stolen Proprietary Source Code – including writing computer scripts that would modify the Proprietary Source Code to conceal its origins. Later on December 7, 2015, Xu met with UC-1 and UC-2 at the Hotel. During that meeting, Xu showed UC-2 a copy of what Xu represented to be the Proprietary Source Code on Xu’s laptop. Xu noted to UC-2 a portion of the code that indicated it originated with the Victim Company as well as the date on which it had been copyrighted. Xu also stated that Xu had previously modified the Proprietary Source Code’s command interface to conceal the fact that the Proprietary Source Code originated with the Victim Company and identified multiple specific customers to whom Xu had previously provided the Proprietary Software using Xu’s stolen copy of the Proprietary Source Code. This case was investigated by the FBI.

July 30, 2016 jeremy

Post navigation

DOJ201606-005 → ← DOJ Reply to Delaware Congressional Delegation

Related Posts

DOJ201606-100

Economic Espionage / Theft of Space Shuttle and Rocket Secrets for ChinaOn Feb. 11, 2010 former Rockwell and Boeing engineer Dongfan "Greg" Chung was sentenced to 188 months imprisonment and […]

DOJ201606-093B

DuPont Trade Secrets to ChinaOn Oct. 26, 2010, Hong Meng, a former research chemist for DuPont, was sentenced in the District of Delaware to 14 months in prison and $58,621 […]

DOJ201606-093A

Valspar Trade Secrets to ChinaOn Dec. 8, 2010, David Yen Lee, a former chemist for Valspar Corporation, a Chicago paint manufacturing company, was sentenced in the Northern District of Illinois […]

DOJ201606-088

Ford Motor Company Trade Secrets to ChinaOn Apr. 13, 2011, Xiang Dong Yu, aka Mike Yu, was sentenced in the Eastern District of Michigan to 70 months in prison. Previously, […]

Recent Posts

NSD201801-042

Trade Secrets to South KoreaOn May 1, 2015, Kolon Industries, Inc., a South Korean industrial company, was sentenced in the Eastern District of Virginia to 5 years’ probation and was ordered […]

More Info

NSD201801-040

Theft of Trade Secrets by Chinese Professors for Technology to ChinaOn May 16, 2015, Tianjin University Professor Hao Zhang was arrested upon entry into the U.S. from the People’s Republic [...]

More Info

NSD201801-029

Theft of Valuable Source Code for ChinaOn June 14, 2016, Jiaqiang Xu was charged in the Southern District of New York in a six-count superseding indictment with economic espionage and theft […]

More Info

NSD201801-028

Satellite Trade Secrets to Undercover AgentOn July 7, 2016, in the Central District of California, Gregory Allen Justice was arrested by FBI special agents on federal charges of economic [...]

More Info
Powered by WordPress | theme SG Window