Scammers Face 150 Years For Photos Of Secret Gear - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
IT Leadership // CIO Insights & Innovation
Commentary
3/18/2009
03:08 PM
Bob Evans
Bob Evans
Commentary
50%
50%

Scammers Face 150 Years For Photos Of Secret Gear

How rigorously do you guard against the risk of visitors surreptitiously photographing confidential assets? Two engineers whose employer had a $1.2M contract with a Chinese tire maker are facing 150 years in the slammer for allegedly scamming their way into a Goodyear plant in Kansas and secretly photographing proprietary equipment. So maybe it's time to review that security plan.

How rigorously do you guard against the risk of visitors surreptitiously photographing confidential assets? Two engineers whose employer had a $1.2M contract with a Chinese tire maker are facing 150 years in the slammer for allegedly scamming their way into a Goodyear plant in Kansas and secretly photographing proprietary equipment. So maybe it's time to review that security plan.A news story on our excellent security site, Dark Reading, reported that just after U.S.-based Wyko Tire Technology landed the contract in 2007, two of its engineers visited the Goodyear plant under false pretenses. Quoting a Justice Department document, Dark Reading said the two engineers then "used a cell phone to surreptitiously photograph proprietary [off-the-road] tire manufacturing equipment."

The photos of the proprietary equipment were then allegedly sent to a Wyko subsidiary in England, where they were used to make replicas of that equipment for the Chinese tire maker, Justice said.

This cloak-and-dagger tale from Dark Reading serves as a good reminder that while cutting-edge cybersecurity threats continue to represent significant dangers for businesses and deserve unwavering attention, vulnerabilities also exist in the more-pedestrian physical world and need to be addressed as well.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
News
How to Create a Successful AI Program
Jessica Davis, Senior Editor, Enterprise Apps,  10/14/2020
News
Think Like a Chief Innovation Officer and Get Work Done
Joao-Pierre S. Ruth, Senior Writer,  10/13/2020
Slideshows
10 Trends Accelerating Edge Computing
Cynthia Harvey, Freelance Journalist, InformationWeek,  10/8/2020
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
[Special Report] Edge Computing: An IT Platform for the New Enterprise
Edge computing is poised to make a major splash within the next generation of corporate IT architectures. Here's what you need to know!
Slideshows
Flash Poll