End User Robbed, Seeks ADT Inside Leak

By Carlton Purvis, Published Mar 25, 2014, 12:00am EDT (Info+)

New documents obtained by IPVM in the ongoing ADT/Tyco vs. Eli Lilly case, the biggest pharmaceutical heist in American history where $75 million worth of drugs were stolen from an Eli Lilly distribution center in Connecticut, indicates that the plantiffs are going after an ADT inside leak.

In this note, we dig into those court documents and contentions.

**********

*** *****'* ********* *******, ******** *****, says *** ********, *** **** ********* ********, ********* *************** **** **** *********** in * ***** *** *****, ******* the ******* ** ******* *** ** partially ** *****.

** **** ****** **** ***** ** a ******* ** *** ********* ***** burglarized ******* ********************** ***********. *** ********* ******** ********** of ********** ** *******, ***** *******, Texas *** **** ******, ********. ** all ** *** **********, ***** ** as *** **** ** ****, *** facilities *** **** ******** ******* ** ADT.

*** ****** *** *** ** **** men ******* **** *** ******** (*** ***** ******) **** ***** ** ** ******** that *** ******* *** ***’* ******** plans *** *** ********.

*********

******** ***** *** *** ***** *** focused ** ******* * **** ** ADT ** * ****** *** *** information, ******** ***** ********* ********* ****. Among *** ***** *** ** ***** asked ** ******* ***:

  • *** ***** **** *** *** ******* and *********, “****** ** *** ******* and ******* **** ***** *********** *****, security *********** *** **** ******** ********* between **** *** **** ** ***’* network
  • “****** ** *** ********* ********* ******* threat *************** *** *****, ******** ** other ******** **** ****/*** ** *** by *** *** *** **** ***** to *** ** *** **** ** the *****-** ** *** *****’* *********”
  • *** ********* ********* ********** ****** ********* on ********* *** *** ****** ** the *** ***** ******** ***********
  • “********** ** ********* ***** *** ******** of ********* *********, ********* ********* **** sensitive *********, ******/******* **** **** ** home, ********* ****, *** ********* ** them ** *** *****.”
  • ****** ** *** **** ** *****-***** work ** ****** ** *** *********
  • ******** ** *** ******** ******** ** destroyed
  • ***** ** ****** *** *********** *** securing ******** ********* *** ****** *** had ****** ** *** ********* ******** information *** **** ***** ***** **** the *******.

**** ***** **** ********. *** **** *** ********* *** pretty *********** *** **** ******** ** finding ** ******* ** **** *** was ***** ** ******* **** ******* threats:

*** ***** ********* ******** ****** ** indicate ******** ***** *** *** ***** know ********* ** ** **** * fishing **********?

******** *****, *** *****’* ********* ******* in *** **** *** ******** ** comment ** ******* **********.

Comments (1)

Fishing expeditions are fully justified when you see conditions perfect for fish.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts reporting, tutorials and software funded by subscriber's payments enabling us to offer the most independent, accurate and in-depth information.
Loading Related Reports