Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Businesses Government The Courts News

Goldman Sachs Trading Source Code In the Wild? 324

Hangtime writes "The world's most valuable source code could be in the wild. According to a report by Reuters, a Russian immigrant and former Goldman Sachs developer named Sergey Aleynikov was picked up at Newark Airport on July 4th by the FBI on charges of industrial espionage. According to the complaint, Sergey, prior to his early June exit from Goldman, copied, encrypted and uploaded source code inferred to be the code used by Goldman Sachs to process in real-time (micro-seconds) trades between multiple equity and commodity platforms. While trying to cover his tracks, the system backed up a series of bash commands so he was unable to erase his history, which would later give him away to Goldman and the authorities. So the question is: where are the 32MB of encrypted files that Sergey uploaded to a German server?
This discussion has been archived. No new comments can be posted.

Goldman Sachs Trading Source Code In the Wild?

Comments Filter:
  • by eldavojohn ( 898314 ) * <eldavojohn@gma[ ]com ['il.' in gap]> on Monday July 06, 2009 @08:34AM (#28593163) Journal
    Even more interesting is in the second article that notifies us that Goldman Sachs has been removed from the NYSE 15 Most Active Members Firms Weekly Report. GS had been #1 the week before and now they're not even on it. These fifteen firms alone represent about 98% of all trades with the NYSE. So what happened?

    The author mentions some things but gives no clear motivation for GS hiding their stats. I would speculate that if one of your developers copied your code and uploaded it to a server discretely, you could have that in your logs and not notice it for days or weeks. But if he then did something to your system to ensure his new employer's ownership of that code you wuold notice that pretty damn fast I imagine. Sergey Aleynikov sounds like a brilliant coder but maybe he's not so smart on legal issues, is it possible he completely hobbled GS to please his new employer? Are they keeping their transaction report hush hush so investers don't worry? Was Sergey Aleynikov thinking he could sell the code and the rights to the code? After all, if he could remove all copies of the code from GS how could they take people to court over the code without a local copy to prove ownership?

    If GS remained #1, they would have left themselves on the list. I presume that something else related to this has gone wrong with their operation, the news just hasn't broke yet.
  • Re:Surely not? (Score:5, Interesting)

    by Richard_at_work ( 517087 ) on Monday July 06, 2009 @08:40AM (#28593211)
    What if having the code allowed you to analyse it for ways to game the system? Knowing precisely how the system will react in certain circumstances could give you a serious leg up when attacking the system on the markets (trade limitations, trend spotting for error codes or edge cases et al).

    This code could be worth significant amounts of money on the international fraud market.
  • Proving theft.. (Score:5, Interesting)

    by MosesJones ( 55544 ) on Monday July 06, 2009 @08:40AM (#28593213) Homepage

    Its hardly surprising that this sort of code is highly valuable but the challenge is surely going to be proving that it was actually stolen. If they have a bash history that doesn't include the IP addresses but just shows that he created a tar ball then where is the proof that he actually stole anything at all?

    The original is of course still there, what he took is a copy, so you can't show something is missing.

    They currently don't know where it has gone, so they can't prove that a copy was moved outside the firewall successfully

    If he hasn't yet sold the stuff on they can't prove there was a financial benefit linked to the theft

    So how will they prove beyond a reasonable doubt that some actual theft has gone on?

    Its not like he has just lobbed it on Bit-torrent or posted it to Wikileaks. What he has done is taken a copy of the code, which means its Intellectual Property and copyright issues rather than "simple" theft and therefore they really need to prove (surely) that he has done something with the code.

    Should be interesting to see how the police "generate" and prove the evidence on this one.

  • by dr.newton ( 648217 ) on Monday July 06, 2009 @08:41AM (#28593219) Homepage

    It seems unlikely to me that any single person, or even small group of people, would have the capability to remove all copies of this code, binary and source, from the company's information infrastructure.

    Is it possible that they have suspended use of this code because they fear that someone analyzing it could profit from the trades it would have made?

  • by fuzzyfuzzyfungus ( 1223518 ) on Monday July 06, 2009 @08:46AM (#28593283) Journal
    That, my friend, is what having your self interest 0wn3d by your primate instincts feels like.

    Don't worry, multinationals have no such weaknesses, and won't bat an eye when you are on the hook.
  • Re:Proving theft.. (Score:4, Interesting)

    by fuzzyfuzzyfungus ( 1223518 ) on Monday July 06, 2009 @08:49AM (#28593319) Journal
    Whenever I run into a tough time proving a case, I fall back on due process of law [maglite.com]...
  • by Ciaran Power ( 447593 ) on Monday July 06, 2009 @08:49AM (#28593321)

    A brilliant coder...

    who's never heard of "history -c"???

    TFS says that his history file was backed up while he was Hacking The Gibson. He might have cleared his .history afterwards but presumably didn't know about/didn't have access to/didn't bother clearing the backup. TFA doesn't mention anything about his history btw, but slashdot wouldn't lie to me.

  • Re:Non-story (Score:3, Interesting)

    by Anonymous Coward on Monday July 06, 2009 @08:56AM (#28593363)
    Well done, sir. I was thinking about just the same (slang/secdb).

    Of course, it wont be easy to install the whole system and then put those bits of code he stole on it and run it. But it is entirely possible those algos were not his, but coming from some of the very important core modules. It can still carry a large value.
  • Cheating (Score:2, Interesting)

    by hummassa ( 157160 ) on Monday July 06, 2009 @09:07AM (#28593451) Homepage Journal
    Down here in Brasil, there is an interesting card game called Truco ("trick me"/"triple up" portmanteau in Portuguese) -- every college student in my State plays it :-D One of the most interesting rules is: "you can cheat as long as nobody catches you in the act". The financial market is based exactly on the same rule.
  • Re:Surely not? (Score:5, Interesting)

    by Richard_at_work ( 517087 ) on Monday July 06, 2009 @09:07AM (#28593459)
    I'm not talking about exploits or bugs, I'm talking about knowing *precisely* how the code will react in given circumstances, *precisely* which edge cases are handled in code, *precisely* what results in an error state and how that error state is handled.

    Knowing such things will allow you to tailor your fraudulant trades so as to not raise suspicion, or to make more money within a set amount of time. If you know precisely how far to push your actions, and then push no further, then you could continue with the same fraud for longer than you would otherwise without being discovered. If you know how often the trend analysis reports are run, and how they do what they do, then you can tailor your trades so as to not appear on those reports - just enough, no more.

    All of which means you can make more money without being detected - and you haven't attacked the software itself, you haven't changed how the code works, you have stayed within the boundaries that the software creates. All because you knew *precisely* how the code works.
  • by Richard W.M. Jones ( 591125 ) <rich.annexia@org> on Monday July 06, 2009 @09:10AM (#28593485) Homepage

    Seems more likely he was caught by auditing through the audit daemon [die.net] in Red Hat Enterprise Linux. It records both high level "actions" taken on the machine, and (in some cases) commands typed at the shell. Unless you have root (in some cases, even if you have root), it's hard to erase those logs.

    Rich.

  • Re:Surely not? (Score:4, Interesting)

    by infolation ( 840436 ) on Monday July 06, 2009 @09:13AM (#28593529)
    The online gambling industry analyzes the games made on their system against games played by known gambling software to identify players cheating.

    Perhaps GS haven't immediately stopped real-time trading using their existing system because they're able to analyze trades made by other brokerages to identify patterns that would indicate whether their own trading system is being used by others.
  • by bartwol ( 117819 ) on Monday July 06, 2009 @09:18AM (#28593571)

    I worked for a financial services company that had similar types of systems. The legal department and security people were always concerned about people stealing our source code.

    But their fears were unfounded. Why? Because the source code is highly customized code that not only implements thoroughly non-standards-based algorithms, but is also tightly coupled to underlying hardware/software platforms (and the non-standardized APIs of their peer systems). The result: you can't run it anywhere but on the infrastructure of the company for which it was built. Sure, you could pull out a subroutine here or there. But overall, it's pretty worthless stuff.

    Humorously, we had a large, difficult, multi-year project to port our code to a newer hardware platform (same O.S. and language tools). I joked that we should post all our source code on the web for free unencumbered download, and if somebody could get it to run on the newer (or any other) platform, we could pay them $2 million for their effort and still come out way ahead in the deal. Everybody laughed and agreed that that would be a dream come true.

  • by morgan_greywolf ( 835522 ) on Monday July 06, 2009 @09:20AM (#28593591) Homepage Journal

    I had not thought of this, although I believe these transactions would be done on secure networks with insane encryption.

    Knowing the algorithms that Goldman Sachs uses to do realtime trades could possibly give you insider information you wouldn't have otherwise had. When doing realtime transactions, if you know the ORDER Goldman Sachs will use to do the transactions, for instance, you could buy certain stocks a minute or two before Goldman Sachs does...since the act of GS (or anyone) buying a stock will increase its trading price some, and you've just automatically made money and hurt GS at the same time.

    This type of insider trading information will likely result in criminal prosecution by the SEC, however, so don't try this at home, kiddies.

  • Re:Surely not? (Score:1, Interesting)

    by Anonymous Coward on Monday July 06, 2009 @09:36AM (#28593727)

    Maybe Goldman is worried that if someone reviews the code, they might be able to discover that Goldman is gaming the system and the source code is just the smoking gun.

    Surely that would be a much bigger problem for Goldman Sachs than an individual or small groups trying (probably unsuccessfully) to game the market.

  • by jonnyj ( 1011131 ) on Monday July 06, 2009 @09:43AM (#28593793)

    You don't need internet access that is in any way shared with your development work. Completely sandboxed internet access in a totally locked down thin client session might be OK, but you certainly don't need to be able to upload data to remote servers. If you think you do, you need to go and read up about segregation of duties.

    But I don't expect you to agree. Your signature displays more about your attitude to the world than you perhaps realise.

  • by CrazyDuke ( 529195 ) on Monday July 06, 2009 @09:49AM (#28593855)

    I damn sure can fault them when they are the architects of said perks. Last I checked [opensecrets.org], Goldman Sachs "donates" quite heavily in DC.

  • Re:Non-story (Score:5, Interesting)

    by anothy ( 83176 ) on Monday July 06, 2009 @09:54AM (#28593919) Homepage
    i have a somewhat-better-than-passing knowledge of how these systems work. i'm very unconvinced by your explanation.

    you seem to be assuming the intent would be to out-compete Goldman by re-implementing this system, perhaps with some changes/optimizations. for that, sure, you'd need the rest of the environment. but a good understanding of the algorithm and implementation could be obtained without the rest of the environment (like i can read C# code and extract the algorithms without having the rest of the environment). that seems like it would be enough to game Goldman's system (which is a sizable part of the system overall).

    note that i am not asserting that this is a catastrophe for Goldman, just that your explanation isn't convincing. i will, however, agree with a previous poster that Goldman's sudden absence from NYSE's 15 most active members [nyse.com], rather than being #1 as they had for a good while, is very suspicious.
  • by anothy ( 83176 ) on Monday July 06, 2009 @09:59AM (#28593981) Homepage
    you're only looking at reputable players here. sure, BofA won't touch GS's code, for a host of very good reasons like those you describe. but for someone looking to game GS's system, being able to run the code is totally unimportant: just reading it could likely be enough to extract exploitable characteristics.
  • a convenient fire (Score:3, Interesting)

    by rs232 ( 849320 ) on Monday July 06, 2009 @10:02AM (#28594015)
    'This week's NYSE Program Trading report was very odd .. what was shocking was the disappearance [blogspot.com] of the #1 mainstay of complete trading domination (i.e., Goldman Sachs) from not just the aforementioned #1 spot, but the entire complete list. In other words: Goldman went from 1st to N/A in one week'

    US v Sergey Aleynikov, Violations of 18 U.S.C $$ 1832(a) (2), 2314, & 2

    "ALEYNIKOV claimed, however, that he only intended to collect "open source" files on which he had worked, but later realized he had obtained more files than he intended. ALEYNIKOV aslo admitted that he has uploaded files from his work desktop from home. ALEYNIKOV claimed he did not distribute any of the proprietary software that he obtained from the Financial Institution, and further claimed that he has abided by an agreement he entered into with his new employer not to use any unlicensed software"
  • by Sycraft-fu ( 314770 ) on Monday July 06, 2009 @10:03AM (#28594023)

    Crooks aren't always that smart. The guy may have the plan of "I take code, sell it to rival, I make millions," having not thought the practical matter through. As another poster noted, the Pepsi/Coke thing DID happen and what they did was contact the FBI.

    While this isn't quite the same situation here, I'm betting the result would be the same. No legit corp wants to be involved in shit like this. It just wouldn't make sense and you'd stand to lose WAY more than you'd stand to gain. So they'd ignore the guy or, more likely, go to the authorities.

    He probably has essentially stolen something that is worthless because there is no market. In theory it has a high value because it is special and was expensive to make but in practice nobody probably wants to buy it and as such it isn't worth anything.

  • by dna_(c)(tm)(r) ( 618003 ) on Monday July 06, 2009 @10:19AM (#28594171)

    [...]since most financial institutions [...]

    I know, because I work for $LARGE_BANK, and we use it there. [...]

    That's a hell of an extrapolation. It could only be correct if there are less than 2.0 possible $LARGE_BANK values...

  • by maxume ( 22995 ) on Monday July 06, 2009 @10:22AM (#28594203)

    I'm not real sure someone with the code would be able to do much at all. I guess someone with the code, billions of dollars (or at least tens of millions), a high volume trading interconnect, and quite a lot of time to analyze the code for self re-enforcing behaviors might be able to make a little bit of money.

    The whole point of the programmed trades is to take advantage of market conditions, staging the market so that one system goes AWOL is going to be a hell of a trick.

  • by guacamole ( 24270 ) on Monday July 06, 2009 @10:23AM (#28594211)

    I believe disabling bash's history logging into a file is as easy as typing :

    HISTFILE=

    at the prompt. In other words, he was probably one command line away from being detected..

  • not exactly (Score:1, Interesting)

    by Anonymous Coward on Monday July 06, 2009 @10:25AM (#28594241)

    They weren't forced, they were part of the insider deals to get the loot. What backfired on them was the executive bonus compensations limitations proposals that came along later. They were perfectly willing to take money they didn't have and use it to acquire other assets initially.

  • by maxume ( 22995 ) on Monday July 06, 2009 @10:32AM (#28594315)

    elrous0 is bitching about something else. AIG is 'unwinding' the insane contracts that drove them out of business; rather than declaring bankruptcy and paying pennies on the dollar, they got 80-some billion dollars from the government and payed it to the people they had these contracts with. elrous0 is saying that Goldman Sachs got $13 billion of that money.

    Of course, between Goldman manipulating and controlling the government in order to receive that money (Secretary Paulson, who did much of the bailing out of AIG was a former Goldman CEO) and the government deciding to bail out AIG in order to preserve millions of annuities and whole life insurance policies, I choose to wear the blinders that let me believe in the latter.

  • Re:Surely not? (Score:1, Interesting)

    by Anonymous Coward on Monday July 06, 2009 @11:03AM (#28594647)
    Sure the Source Code will only teach you so much. Like being able to break in without needing root access passwords for one...
  • by bartwol ( 117819 ) on Monday July 06, 2009 @11:14AM (#28594755)
    Nope. You're unlikely to find interesting stuff there. The trading strategies mostly exist in the heads of traders, sometimes on their spreadsheets, sometimes in VB on their desktops, but rarely in the data centers.

    It's easy to think of these companies as monoliths, but it's not like that at all. Most of them have grown through acquisition. The systems of the acquired companies are only loosely integrated into core systems. And you'd be surprised how competitive and autonomous their traders are...each one tries to find his own advantage, and when he does, he's HIGHLY protective of it and unlikely to have the inclination or resources to put it into code.

    There are some exceptions to this. For example, there are some large asset inventory databases with an occasionally interesting costing methodology that could be useful to just the right kind of person who is positioned just right to take advantage of that knowledge. But that's a highly speculative and unlikely possibility.

  • Re:Surely not? (Score:4, Interesting)

    by Maxo-Texas ( 864189 ) on Monday July 06, 2009 @11:36AM (#28595047)

    Yes, but the root password list consists of having large numbers of government positions filled with former (and future) GS employees.

    Hard to put that in a suitcase.

    A lot of money was funneled to GS by Paulsen (a GS alumni) and some of their major competitors were crippled.

    Recently close to 40% of NYSE volume was GS which gives them enormous power to manipulate prices.

  • Re:Surely not? (Score:3, Interesting)

    by Hatta ( 162192 ) * on Monday July 06, 2009 @11:41AM (#28595117) Journal

    Knowing such things will allow you to tailor your fraudulant trades so as to not raise suspicion, or to make more money within a set amount of time. If you know precisely how far to push your actions, and then push no further, then you could continue with the same fraud for longer than you would otherwise without being discovered

    And if the public has access to this source code, we can figure out how someone trying to avoid detection would behave and nab them. Someone out there has access to this source code, and is almost certainly abusing it. Opening this source code would level the playing field. Absolutely nothing about our financial systems should be secret.

  • Re:Surely not? (Score:3, Interesting)

    by blahplusplus ( 757119 ) on Monday July 06, 2009 @12:15PM (#28595533)

    "While in the good old days the banking business was simply a place to store and borrow money, it has now become a mess so complicated that nobody really understands it anymore."

    The real problem is that stocks are a legalized ponzi sceheme and should be done away with entirely, it's basically a ponzi scheme through abstraction using machiens so you don't see the other people trying to fuck one another over for personal gain.

    Securities themselves are the problem they allow the wealthy to suck wealth out of society on unprecedented scales in a legal way that is entirely suspect to begin with. If we could get rid of things like securities and credit default swaps, savings would probably pay pay a hell of a lot better. Trading is just too enticing for those that have the mega bucks and quite rankly it's a drag on the real economy.

  • by jonnyj ( 1011131 ) on Monday July 06, 2009 @12:26PM (#28595679)
    i'd respectfully suggest that the kind of quant that refuses to play nicely with security policies is the kind of quant that I'd rather not employ. And as I'm the kind of guy who gets to decide who works in parts of a financial services company, I'd also respectfully suggest that the kind of quant who refuses to play nicely with that kind of policy will find his career and earnings opportunities somewhat constrained compared with the kind of quant who's prepared to fit in with company policy.
  • by Anonymous Coward on Monday July 06, 2009 @02:19PM (#28597367)

    The easy answer is to close the market, or to limit anyone to two trades per day (or one trade an hour, or something like that), but that will likely not fly.

    The easiest answer would be for everyone to wise up and pull all their money out of the market.

    I'd like to see the banks keep playing if everyone else takes all their chips and goes home. We might even get back to a stable market instead of the "thing" that got created ever since the heyday of the Day Trader in the '90s. :/

  • by cpu_fusion ( 705735 ) on Monday July 06, 2009 @03:04PM (#28598023)

    Found a post on ACM by someone with same name as the accused. Looked like a person with research background in Neural Networks. No idea if it is the same person, but it would be intriguing to me if Goldman Sachs was using neural networks for trading.

    One interesting facet: if two or more counterparties in a market had neural networks that were trained to coordinate and cooperate in ways that would violate trading rules (e.g. like bridge players sharing info through actions), would the company be liable if the neural networks had developed these exchanges by themselves? In other words, would it be an instrumentality for violating the law if it learned, on its own, to violate the law, and the programmers / administrators "had no idea" it was doing that?

  • by Hynee ( 774168 ) on Monday July 06, 2009 @07:25PM (#28601353) Homepage
    I don't think it works like that, but I'm not an economist. I think the catch here was that the future price of the oil sitting in the ground went up massively, because there aren't any ways to increase the supply before it runs out. I believe articles like this Rolling Stone article peddle quasi-economic arguments, looking for correlations then asserting cause/effect without proving it.

    I have to make an errata of sorts, Goldman Sachs not only didn't go bankrupt they actually profited heavily from the crash in the subprime market... kind of takes the edge off half my comments.

The hardest part of climbing the ladder of success is getting through the crowd at the bottom.

Working...