Risk
3/12/2009
04:20 PM
Tim Wilson
Tim Wilson
Quick Hits
50%
50%

Two Engineers Arraigned For Theft Of Trade Secrets From Goodyear

Technicians allegedly took photos of proprietary equipment and used them to make equipment for Goodyear's Chinese rival

Two Wyko Tire Technology engineers are facing up to 150 years in prison after allegedly scamming their way into a Goodyear tire factory and secretly photographing its proprietary equipment.

According to a UPI report, in early 2007 Wyko secured a contract to supply the Haohau South China Guilin Rubber Co. with tire manufacturing equipment, the U.S. Department of Justice said in a statement.

In May of that year, Wyko engineers Sean Howley and Clark Roberts allegedly visited a Goodyear Tire & Rubber Co. plant in Topeka, Kan., under false pretenses. During the visit the pair "used a cell phone to surreptitiously photograph proprietary [off-the-road] tire manufacturing equipment," the DoJ said.

The photographs, which contained "valuable trade secret information," were sent to a Wyko subsidiary in Dudley, England, where they were used to build similar equipment for the Chinese tire company, according to the DoJ. The contract was worth approximately $1.2 million.

Roberts and Howley were arraigned in Knoxville, Tenn., and both denied the charges against them. If convicted, the two face up to 150 years in prison and a fine of $2.75 million on 12 counts related to theft of trade secrets and trade fraud, Justice said.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

CVE-2014-2716
Published: 2014-12-19
Ekahau B4 staff badge tag 5.7 with firmware 1.4.52, Real-Time Location System (RTLS) Controller 6.0.5-FINAL, and Activator 3 reuses the RC4 cipher stream, which makes it easier for remote attackers to obtain plaintext messages via an XOR operation on two ciphertexts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.