Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:45 AM
Alexander Wolfe
Alexander Wolfe
Connect Directly

HP Spy Charges Put PC Hacking In Perspective

Thoughts of security breaches typically focus on hacking, but that stuff is small potatoes when compared to the big kahuna of unauthorized access: corporate spying.

Thoughts of security breaches typically focus on hacking, but that stuff is small potatoes when compared to the big kahuna of unauthorized access: corporate spying.Where's the glory in stealing a few million credit card numbers when you can get the goods on a competitor's new-product plans.

That's the charge that's flying around in a lawsuit involving HP's former VP of business development, Karl Kamb Jr. The original legal action began in November 2005, when HP sued Kamb, charging him with trying to start a company while he was working for HP.

The corporate spying allegations surfaced in a counterclaim filed by Kamb last Friday. (CNET broke the story, but I'll quote directly from Kamb's filing, which I obtained via Pacer.) In the court document, Kamb alleges the following:

"In 2002, HP became concerned about Dell's entry into the printer business…Because of its concerns, HP was interested in obtaining information regarding Dell's products, business strategies and models, cost structure, product development, manufacturing, and marketing, among other things.

"Accordingly, personnel within HP's Imaging and Printing Group's Competitive Intelligence Team instructed Kamb to make contact with individuals who had knowledge regarding Dell's plans to enter the printer market, in order to gather information regarding Dell's plans."

Pretty mild stuff, so far, right? What's wrong with having a "competitive intelligence" department? Heck, what do tech journalists write about for a living? But here's where Kamb's charges get ugly. He alleges that HP offered Katsumi Iizuka, the former president of Dell Japan, a monthly stipend to act as a "competitive analyst" for HP, in exchange for information. (Everyone wants information.)


"Payments were to be processed by a third party data consolidator who would act both as a payment facilitator and as a collector and translator of secret information. Upon information and belief, those payments were approved by senior HP management. In an effort to conceal HP's clandestine activities, code names were assigned to the Dell data collection project."

For the record, HP told CNET that Kamb's counterclaims are without merit. I can't tell whether HP has responded to the court yet; HP has filed at least two subsequent motions, but they're under seal, so it's not clear whether they're procedural (which is what they seem to be from their titles) or whether they relate direcly to the counterclaims.

[Update, Jan. 25, 5 p.m.; U.S. District Judge Michael Schneider today ordered Kamb to withdraw his counterclaim. He also ordered that, if Kamb wishes to refile, he do so under seal. Finally, he ordered Kamb not to talk to the press about the allegations in his counterclaim.]

Regardless, my purpose in blogging about l'affaire Kamb is not to express shock (shock!) that corporate espionage, licit or otherwise, occurs. It's to note that such information-gathering activities ("competitive intelligence," in the parlance used in the suit) are undoubtedly far more widespread than we know.

One can also infer that, while hacking is largely the province of amateurs (i.e, unpaid freelancers, aka geeks) or, in its most nefarious incarnation, people with ties to organized crime, corporate data gathering is paid for and encouraged by professionals. Indeed, I submit that it's so widespread we pay it no nevermind.

From Russians in the old days who used to scour the old Engineering Societies library on 47th Street in New York City to get the latest technical info (or read Aviation Week), to marketing types reading the trade rags, competitive information is the currency on which tech businesses survive. Sure, when it crosses the line into pretexting or tempting someone to spill the beans on company data they're pledged not to reveal, that's bad and often illegal. But, please, let's not be naive.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...