End User Sues ADT/Tyco For $42 Million

Author: Carlton Purvis, Published on May 06, 2013

It was the biggest drug heist in American history. Burglars drove an 18-wheeler up to the Eli Lilly distribution center in Enfield, Connecticut, disabled its security system, rappelled through the roof and made off with $75 million in pharmaceuticals. [UPDATE May 7, 2013 - case dismissed, then refiled with new claims against ADT / Tyco].

Last summer, the U.S. Attorney’s office indicted 11 people for selling drugs stolen from the facility, but the burglary case has centered around the Villa brothers, Amaury and Amed, who are now awaiting trial in Connecticut

Eli Lilly’s insurance company, National Union Fire Insurance, is suing Tyco and ADT to recover money it paid out after the heist. National Union believes ADT’s failure to protect sensitive security information led to the heist and is asking for $42 million in damages. In this note, we review the complaint and situation.

Background

According to court filings, ADT has provided security equipment and monitoring for Eli Lilly’s Enfield locations since 1974. In August 2004, ADT reviewed the distribution center’s security system and provided Eli Lilly with a report that included an inventory of all its existing security equipment and suggestions for additional surveillance. Later than year, Eli Lilly signed a 5-year contract with ADT to implement the improvements noted in the report. The contract included annual inspections and reports.

In 2009, ADT again evaluated the Enfield facility, this time to “review of the adequacy of the services provided” under the 2004 contract.

** ******** ** *** **** ******, ***** *** *** ******* any **** ** ******** ** *** ******** ** ********* *** vulnerabilities, *** **** *** ******** ******** *********** ** ****** *********, their *********** *****, *** ***** ****** ***** ****. ** ******** blueprints ** *** ******** ****** **** *********** ** “***** ****** detector, ****, **** *****, ********, ******** **** *******, ***** ******, panic ******, **** ********, ***** ***** ******, *******, ******* ***** and ******,” ********* ** *** ********* **** ******** *****. *** ****** also ***** **** *** ****** ******* **** *** *** ******* by ******* ** ****** *********.

*** “******** * ******** *** ******** ****** ** *********’* ******** security ****** ******* * “************* ***** ** ***** ******** ************* and **** ******** ** **** ******,” *** ********* ****. **** **** a ***** ***** *** ****** *** ******* ******* **** *** with * *******-******* ***** ** ***************.

Too **** ************?National Union believes thieves had access to the report and here is why (see the **** *********):

  • ***’* ******* *** ***** ** **** *****, *******. *** *** men ******** *** *** ******** **** **** *******.
  • ******* ** *** *********** ******** ****** *** *******-******* ** *** only ******* **** ******* ** **** ** *** ********'* ************ cameras.
  • *** ******** ******* ****** ****** ** *** **** *** ******* by ******* * * **** ** * **** **** ***** the ****** ******* **** -- *** **** **** *********** ** the **** ****** *** *** **** **** ****** *** ******** not ******* ** ************ *********. ****, **** ******** *** ******** system.

*** ** **** ******** ** **************, *******, *** ***** **** not **** *** **** ******* **** *** ***** ***** **** leaked *** ***** **** ** ****** ** ******* **** ***. But ******** ***** ******** ******* ***** ***-******* ********** **** *** had * **** *** *****. 

*** ********* ******** ********** ** ********** ** *******, ***** *******, Texas *** **** ******, ********. ** *** ** *** **********, which ** ** *** **** ** ****, *** ********** *** been ******** ******* ** ***.

**** ** ****** *****, *** *** ******** *** *** *** Lilly ****, **** ********* ** *** ** ****. ****** *****’* lawyer **** *** ******** ***** ** ******** ***** ***** ********** *** ******** ***** ******** ***** ***** *** *********.

******** ***** ******** **** ***'* ******* ** ********** ******* ** sensitive ************ *********** ** * ******** ** ******* *********** ** the ****. *** *******: *** **** * ************* **********, **** not **** *****, * ******** ** *********** ** ******* **** advanced ********* ** ******** *******. 

Feedback **** ******** ***** / *** *****

* ************ *** *** ***** ******** *** ********* ******* ** the **** ** ******** *****. * ************ *** ******** ***** said **** ** *** **** ***** ******* **********, *** ** would *** **** ********** *********** ** ***** ******* **** ***** what ***** ******* ** *** ********* ******** ***** *** ** ADT’s **********.  

******** ***** **** *** *** ***** ***** *** *********** *** ADT ** ********* *** ******* ** ***** *** ******* ** the ********** ********* ******** ***** ******* *** ******* ** ********* sensitive ***********. *** “*** * **** ** *** **** *** knowledge **** ******** ********** ** ********** ** ***** ** ******** security ********, *** ***** ***** ********* ************ *********** ***** *** details ** *** ******** ******* ** *********,” *** ********* *****. 

How *** ********* ******** ********* ****** ***********?

* **** ********** ******* ************** **** ** ** *** **** that **** ***** *** ***** ************ ** *** *** ***** case, *** **** ** *** ******* *** ***** ***** ** reviews ** ******* ******** *********** **** ***** ***** *** ***************. They ******* ******* * **** ** *********** ********* *** **** sometimes **** ******** *********. 

**** ********* ******* *** ********, **** *** ****** ** * secure ******* ********** ** **** **** ********* *** *************** *** not ******** *** ** *****. *** ******** ******* **** *** discussed ** ****** ** ** *** *****, **** ****. 

“** *** * *** ** ****** **** **** *********,” *** Tyco ************** ****. “**** ****** **** * **** ** ***** loss ********** ****** ***************.”

UPDATE: **** *********

** ***** ****, ******** ***** *********** ********* *** **** ******* Tyco *** ***,********* ** ***** ********* ******** *********. **** ***** *** ***** ***** **** ****** ****** ** *******. ** *** ******, **** **** *** *****’* ******** **** National ***** ****** ** **** ***** ** *** *****’* ******. Additionally, *** ****** **** *** **** *** ******* ***** ***********’* statute ** *********** *******.

* ****** *** ******** ***** ********* **** ********* **** *** case *** *********, *** ** “**** ** *** ** *** Florida ******.”

******: *******

*** **** *** *** **** ***** ** *******. ****** *** ****, ******** ***** ******** **** ****** *** **** ***** *** access ** ***'* *******. ***** ***** *****, *** *****'* ******, **** *** still **** *** **** **** ********, ** ***, ******** ***** has ********** **** ** ****** ******** *****. ***** *** *****, she ****, *** *** ***** ***** ** *** ******* ****** Eli ***** ******** ***** ** **** ** *** **********. 

“***** ********** ****’* ********. ***** *** ****** ****** *** ** civil ********** **** ****’* ****** ****,” **** *****’* ******. ***** said ******** ***** ** **** ***** *** ******.

Comments (1)

Whether the modality of the crime fits with an unsecured security assessment, it does provide a good opportunity for everyone to assess how this information is kept.

In so many cases, 'conveinience' DOES NOT EQUAL 'secure'. Keeping these reports locked up behind firewalls and granting file access on explicit permissions seems to be especially prudent. Making a point to demonstrate the data security of this information to (potential) customers/management might put them more at ease.

Having copies of these docs floating around unsecured on laptops or cell phones invites nightmarish trouble!

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

GDPR For Video Surveillance Guide on Apr 12, 2018
The European Union’s General Data Protection Regulation (GDPR) comes into force on May 25, but there is much confusion and no clear guidelines on...
Audio Usage In Video Surveillance Statistics on Mar 28, 2018
Audio is more widely available and easier to use than ever, with many IP cameras building audio in and often making integration as simple as...
Axis Wins, Arecont Cancels Multi-Imager Patent on Feb 26, 2018
16 months after Arecont publicly threatened Axis and 7 months after Axis took Arecont to patent 'court', Axis has won, with Arecont canceling all...
The Interceptor Aims To Fix Vulnerability In Millions of Alarm Systems on Jan 08, 2018
Security executive Jeffery Zwirn claims a 'catastrophic' flaw exists in 'millions of alarm systems', and dealers could be liable if not fixed. The...
Chinese Government Attacks Western Reports on Jan 03, 2018
The Chinese government is angry at the BBC and WSJ's reporting on Chinese video surveillance (see BBC Features Dahua and WSJ Investigates China's...
Avigilon / Canon New Lawsuits, No Settlement on Oct 11, 2017
In July, Canon sued Avigilon, a notably rare move amongst major players in the industry, including Canon's subsidiaries Axis and Milestone. At...
Axis and Arecont Legal Conflict Over Multi-Imager Cameras on Aug 17, 2017
Arecont threatened Axis. Axis has responded by moving to invalidate an Arecont patent. It is an important contest. Multi-imagers are Arecont's...
IP Camera Specification / RFP Guide 2017 on Aug 14, 2017
RFPs are hard. Do them 'right' and it takes a lot of knowledge and time. Do them 'wrong' and you can be (a) unwittingly locked into a specific...
Canon Sues Avigilon on Jul 27, 2017
Canon, owner of Axis and Milestone, has sued Avigilon for patent infringement in US court. This is a highly atypical move for Canon, pitting 3 of...
Milestone Beats OnSSI In Court on Jul 17, 2017
The litigation between former partners Milestone and OnSSI has finished, confirmed by both parties. In April 2016, OnSSI sued Milestone and in...

Most Recent Industry Reports

The Yolo Bro And The Death of Journalism on Apr 24, 2018
There's an old quote: The job of the newspaper is to comfort the afflicted and afflict the comfortable Unfortunately, the opposite is more...
DMP Adds Ring Video Doorbell Integration on Apr 24, 2018
Video doorbells have become one of the hottest items for security systems. After several years with no doorbell, DMP has announced integration with...
Milestone 2017 Financials Examined on Apr 24, 2018
For ISC West 2018, Milestone released ... their financials, touting "strong revenue growth in 2017". However, there were discrepancies with the...
Chinese Manufacturer Kickstarter Campaign Huge Success (EverCam) on Apr 23, 2018
In a week, a Chinese manufacturer's expertly done Kickstarter campaign has received $1.4 million in pledges, an incredible amount for a video...
Favorite Biometrics 2018 on Apr 23, 2018
Biometrics are on the rise, or at least integrator opposition to them is declining, according to new IPVM integrator statistics.   Almost half of...
Dahua and Hikvision Win Over $1 Billion In Government-Backed Projects In Xinjiang on Apr 23, 2018
Dahua and Hikvision have won well over $1 billion worth of government-backed surveillance projects in China’s restive Xinjiang province since 2016,...
May 2018 Camera Course on Apr 20, 2018
Save $50 on early registration until this Thursday, the 26th. Register now (save $50) for the Spring 2018 Camera Course This is the only...
Global Real-Time Video Surveillance - EarthNow on Apr 20, 2018
A new company, EarthNow, with backing from Bill Gates, Airbus and more, is claiming that: Users will be able to see places on Earth with a delay...
Dedicated Vs Converged Access Control Networks (Statistics) on Apr 20, 2018
Running one's access control system on a converged network, with one's computers and phones, can save money. On the other hand, hand, doing so can...
April 2018 IP Networking Course on Apr 19, 2018
This is the last chance to register for our IP Networking course. Register now. NEW - 2 sessions per class, 'day' and 'night' to give you double...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact