Sentencing in DuPont insider theft case delayed again; former scientist faces 10 years in jail

Share this article:

The U.S. Department of Justice (DOJ) has again postponed the sentencing of the former DuPont scientist who admitted he stole $400 million in intellectual property from the company.

The former employee, Gary Min, who worked as a research chemist for DuPont for 10 years before accepting a job with competitor Victrex in October 2005, pleaded guilty on Nov. 13, 2006, to stealing trade secrets. His sentencing, already delayed once, is now scheduled for Oct. 18.

Min, also known as Yonggang Min, faces a maximum prison sentence of 10 years, a fine of up to $250,000 and restitution. He admitted downloading 22,000 sensitive documents and viewing 16,706 more in DuPont's electronic library.

That made him the database’s most active user, according to prosecutors. After months of accessing the intellectual property unimpeded, Min informed DuPont that he was leaving the company in 2005. DuPont noticed his unusually high data-access rate within the library after he gave notice and contacted the DOJ .

After Min left DuPont, he transferred 180 DuPont documents to a Victrex-owned laptop after switching jobs.

According to figures from the U.S. Secret Service, 75 percent of intellectual property thefts are perpetrated by employees.

While it's likely that DuPont had policies in place specifying who could access what types of information, policies only go so far, Phil Neray, vice president of marketing at Guardium, told SCMagazine.com, saying, "Policies are important, but you have to have [automated] tools in place to enforce those policies."

Wain Kellum, president and CEO of Trusted Network Technologies, told SCMagazine.com today that this case is a prime example of a company underestimating the value of its information assets.

"Information assets have become the third category of a company's valuable assets," he said. "[DuPont may have forgotten that] information assets are every bit as valuable as its physical and financial assets."

Corporate managers are only now beginning to realize this, he added. In any case, until recently, automated tools to monitor this kind of internal activity weren't available.

Putting automated monitoring systems on a corporate network gives enterprises two key tools in combating insider threats, added Neray.

"They allow identifying the unlawful activity with real-time alerts, and they create a body of forensics-quality evidence the enterprise can use [to prosecute]."


Click here to email West Coast Bureau Chief Jim Carr .

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Information sharing requires breaking down barriers, White House cyber guru says

Information sharing requires breaking down barriers, White House ...

The White House has advanced an agenda to promote and facilitate information sharing on security threats and vulnerabilities.

Worm variant of Android ransomware, Koler, spreads via SMS

Worm variant of Android ransomware, Koler, spreads via ...

Upon infection, the Koler variant will send an SMS message to all contacts in the device's address book.

Patch for Windows flaw can be bypassed, prompts temporary fix from Microsoft

Patch for Windows flaw can be bypassed, prompts ...

The Windows zero-day received a patch last week, but the fix can still be bypassed by crafty attackers.