Data Loss Prevention, Insider Risk

Apple Employee Steals Thousands of Self-Driving Car Files

By Veriato Team

No greater tech is at the forefront of cutting-edge technology than the self-driving car. With applications in the delivery, transportation, and consumer spaces, companies today are racing to ensure they have a place in this unfolding market of autonomous driving.

There are plenty of rumors going around about Apple’s plans for their autonomous driving technology –  including over 5000 employees dedicated to the effort. It’s definitely an important venture for Apple; so much so, that they don’t want any of the data involved in the project falling into competitor hands.

But that’s exactly what Apple faced, according to a federal criminal complaint unsealed this week. The FBI arrested Jizhong Chen, a Chinese national working for Apple. His mistake was being seen taking pictures in a “sensitive workspace” – his actions were reported to Apple Global Security.

Chen allowed Apple Global Security to search his personal computer, where they found every companies insider threat nightmare:  Chen had compiled thousands of files containing Apple intellectual property, manuals, schematics, and diagrams, as well as over one hundred photographs taken.

Contractors bring with them a certain degree of risk; they aren’t necessarily loyal to your organization and may have their loyalties place on themselves or another employer. If you’re utilizing contractors, you should be employing additional levels of security that include Employee Monitoring Software to provide your security team visibility into contractor actions.  Applying this to Apple’s case, Chen’s actions of simply copying files would have triggered Apple Global Security the moment it happened. There’s no telling if Chen had already sent the files off to a competitor. But one thing is for sure, the insider with access is always a risk.

Insider Risk – How Prepared Are You?

Insider Risk – How Prepared Are You?

Not every company is equally prepared to deal with insider risk. This report outlines the four stages of insider risk maturity and explores how to improve your insider risk preparedness.

About the author

Veriato Team
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Quis ipsum suspendisse ultrices gravida.

Insider Risk & Employee Monitoring Resources

2026 Insider Risk Predictions: What Organizations Must Prepare For

2026 Insider Risk Predictions: What Organizations Must Prepare For

Key Takeaways: What 2026 Holds for Insider Risk  AI and Sentiment Analysis Take the Lead In 2026, AI-powered risk prediction and sentiment analysis are no longer emerging; they’re essential. Organizations that operationalize behavioral signals and intent-based...

Why Boards Must Take the Lead on Insider Risk Oversight

Why Boards Must Take the Lead on Insider Risk Oversight

Key Takeaways  Insider Risk Is Business Risk Insider threats have swiftly become one of the most prevalent and financially burdensome forms of cyber risk. This necessitates immediate board-level visibility and proactive risk management. Boards Are Accountable...

Predict and Prevent: How AI is Changing Insider Risk Management

Predict and Prevent: How AI is Changing Insider Risk Management

Key Takeaways  Insider risk is now a board-level concern 83% of organizations experienced an insider-related incident in 2024, making it one of the most pervasive cybersecurity challenges today. (IBM, Insider Threat Report, 2024) Traditional tools lack context DLP and...