iPhone 5 thieves break into mobile shops in Japan hours before launch
- 21 September, 2012 03:48
Thieves broke into a number of mobile phone shops across central Japan and stole hundreds of iPhone 5 handsets hours before the device went on sale Friday morning, police said.
The robbers broke doors and forced open the front shutters on at least three shops in Osaka, two run by Japanese operator au and another by Softbank, making off with 191 iPhone 5 handsets in the thefts, which are uncommon in the country. Local media reported that thefts also occurred in nearby Kobe, bringing the total number of handsets to over 220.
"These sorts of robberies are rare here," Nasakazu Ohashi, a deputy police chief in Osaka, said.
Ohashi said that in his Osaka precinct robbers forced their way into the back door of an au shop at around 2 a.m. local time, making off with 42 handsets valued at about 300,000 yen, or US$40,000. At a Softbank shop in a different part of the city, a security camera captured three men, who forced open metal shutters covering the front door, gathered up 116 phones in storage and on display, and disabled an alarm on the back door before running away on foot, all in a four-minute span from 4:24 a.m. local time.
Police said the robbers apparently targeted only the iPhone 5, leaving earlier versions of the iPhone and handsets from other manufacturers untouched.
The iPhone 5 is already generating as much or more fanfare than previous launches in Japan, one of the first countries to begin iPhone sales on Friday. In central Ginza in Tokyo, nearly 800 people lined up outside the Apple Store, with those in the front of the line waiting nearly a week for the privilege. The smaller shops plundered on Friday were in far less populated parts of the country.
In Japan, au and Softbank, the second and third largest carriers behind NTT DoCoMo, are the only two to offer the iPhone.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Securing the Road to Virtualization and Beyond
Traditional security controls for enterprise don’t necessarily translate into the new world of virtualisation and cloud environments. When mapping out a secure virtualisation roadmap, click to find out about pave a more secure, risk free path.
Android Malware Exposed
Take an in-depth look at the evolution of android malware. The world of malware targeting the Android OS is similar yet very different from malware affecting Windows. Explore the rapidly evolving world of android malware and shed light on the various techniques used to exploit devices using this OS.
Implementing A Security Analytics Architecture
According to the 2012 Verizon Data Breach Investigations report, 99% of breaches led to data compromise within “days” or less, whereas 85% of breaches took “weeks” or more to discover. This presents a significant challenge to security teams as it grants attackers extended periods of time within a victim’s environment. More “free time” leads to more stolen data and more digital damage. Principally, this is because today’s security measures aren’t designed to counter today’s more advanced threats. Read on.