Lopez was the head of General Motors’ Global Purchasing division when he defected for GM competitor VW to head that company’s purchasing operation in 1993. According to a lawsuit filed by GM, Lopez and other company executives brought with them more than two million pages of top-secret GM documents, which they had culled in the months leading up to their departure. The documents included business plans, automobile designs and factory blueprints. By 1996, VW had opened its first factory that, GM claims, was built using the pilfered plans.
Browsing Author: Chris Brook
Klein and Amar Lalvani were two top executives at the Starwood hotel chain when they were recruited by Starwood’s chief competitor, Hilton, to help it start a new line of “lifestyle” hotels to compete with Starwood’s popular “W” hotels. According to a lawsuit filed by Starwood, the two executives are alleged to have absconded with over 100,000 confidential Starwood documents on their way out the door.
Meng was a 44 year-old software engineer living in Cupertino, California when, in 2008, he became the first person sentenced for a violation of the U.S.’s Economic Epionage Act of 1996. Meng had worked as an engineer for Quantum3D, a defense contractor that makes visual simulation software used for military training and other purposes. According to the U.S. Department of Justice, Meng engaged in widespread spying on behalf of The People’s Republic of China between 2002 and 2006: obtaining the source code for software known as Mantis, used by the U.S.
Min worked at Delaware based chemicals giant DuPont for over a decade before he surreptitiously took a job at DuPont competitor, Victrex. Over a four month period after accepting that offer, and before informing DuPont of his decision, Min systematically copied thousands of pages of confidential DuPont design documents to a laptop. DuPont became aware of Min’s theft only after the employee gave notice.
Bradley Manning’s is the face that launched a (hundred) thousand leaks. The 22 year-old intelligence analyst for the U.S. Army’s 2nd Brigade Combat Team, 10th Mountain Division was stationed in Iraq when, allegedly, he downloaded hundreds of thousands of classified documents and video from SIPRnet, the military’s classified intelligence network.
Even before PFC Bradley Manning made off with hundreds of thousands of pages of classified military and diplomatic documents, malicious insiders were a persistent and growing problem in the halls of government, The Pentagon and inside companies large and small. According to Verizon’s 2010 Data Breach Report, 48% of data breaches were caused by insiders – a 26% increase from the previous year. Likewise, the U.S. Military’s Defense Security Service (DSS) reports that insiders have caused more damage to the U.S.
Malicious text messages can crash many types of mobile phones, including devices by Samsung, Sony Ericsson, Motorola and LG, according to a presentation given at the Chaos Communication Congress hacking conference this week in Berlin.
Smartphone adoption has exploded in recent years, and this has not been lost on the attackers who are looking for the best way to separate users from their money and confidential data.
As predicted by researcher Dino Dai Zovi in these pages in January, 2010 turned out to be the year of the sandbox. Attackers for years have been focusing their attention on browsers and other Web apps and using them as jumping off points for further attacks on compromised PCs. Vendors finally began to take notice and implement sandboxes in their products.
There were a lot of excellent talks at conferences this year, but perhaps the most interesting and far-reaching presentation was one given by researchers Thai Duong and Juliano Rizzo at Ekoparty on a crypto attack against ASP.NET applications.