WSJ Tech News Briefing: How a Coder Helped a Crime Ring Steal Thousands of iPhones From Porches
Release Date: March 21, 2025
1. Introduction
In this episode of the WSJ Tech News Briefing, host Victoria Craig delves into two compelling stories shaping the tech landscape. The first segment features insights from Aisha Evans, CEO of Zoox, an Amazon-backed autonomous vehicle company. The second exposes a sophisticated crime ring that exploited technology and insider access to steal thousands of iPhones from unsuspecting consumers' porches.
2. Zoox and the Future of Autonomous Vehicles
Guests:
- Aisha Evans, CEO of Zoox
- Tim Higgins, WSJ Columnist
- Christopher Mims, WSJ Columnist
Overview: Aisha Evans discusses Zoox's unique approach to autonomous vehicles amidst a competitive market dominated by giants like Waymo and Tesla. Unlike other companies racing to rapidly deploy their technologies, Zoox emphasizes safety, collaboration, and thoughtful deployment within controlled environments.
Key Discussions:
-
User Experience of Zoox Vehicles:
- Christopher Mims (01:43): Describes the Zoox vehicle as "boring in some ways," highlighting its design focused on comfort and functionality rather than spectacle. The interior resembles a "lounge" with features like tinted windows, Muzak playing, and specialized lighting, creating a serene environment for passengers.
-
Zoox's Differentiation in the Market:
- Christopher Mims (02:21): Compares Zoox to other players like Waymo and former competitor Cruise, noting Zoox's strategy of deploying vehicles in "very small segments" to iteratively learn and improve, prioritizing safety over rapid expansion.
-
Aisha Evans on Leadership and Innovation:
- Aisha Evans (03:39): Emphasizes a collaborative mindset, stating, “I try and have some respect and humility. And so I have called them fellow travelers... What either of us does affects the other, whether we like it or not.”
-
Contrasting Silicon Valley's "Move Fast and Break Things" Mentality:
- Christopher Mims (04:13): Highlights Zoox's departure from the typical Silicon Valley rush, focusing instead on sustainable and responsible deployment. Under Evans' leadership, Zoox remained true to its original vision even after Amazon's acquisition in 2020.
-
Amazon's Role in Zoox's Evolution:
- Christopher Mims (04:56): Notes that post-acquisition, Zoox didn't pivot towards package delivery but stayed committed to developing a robot taxi service, reinforcing its unique "toaster-like" vehicle design and consumer-focused approach.
Notable Quotes:
- Aisha Evans (03:39): “This is a big industry. I try and have some respect and humility... What either of us does affects the other, whether we like it or not.”
- Christopher Mims (02:21): “Zoox is the next entrant, if you will... They are trying to deploy these vehicles in very small segments so they can learn from it and improve from there.”
3. The High-Tech Heist: Stealing iPhones from Porches
Guest:
- Esther Fung, WSJ Reporter
Overview: Esther Fung uncovers a meticulously organized crime ring that combined technological prowess with traditional bribery to steal thousands of high-value electronics, primarily iPhones, from consumers' porches across multiple U.S. states. The operation leveraged real-time data scraping from FedEx websites and insider access from AT&T store employees to target valuable packages efficiently.
Key Discussions:
-
Modus Operandi of the Crime Ring:
- Esther Fung (06:56): Details how the criminals used computer scripts to scrape FedEx tracking numbers and obtained customer package data through bribed AT&T employees. By correlating these data points, they could identify and target packages containing valuable items like iPhones and AirPods.
-
Sale and Redistribution of Stolen Goods:
- Esther Fung (07:10): Explains that tracking numbers were sold on Telegram, a messaging app, allowing buyers to receive addresses and delivery times. Thieves would then steal the packages and sell the devices both domestically and internationally, particularly in regions where demand remains high.
-
Coordination and Execution:
- Esther Fung (07:30): Highlights the centralized coordination required, including creating special codes to bypass FedEx data sharing limits and orchestrating thefts across various locations, including Brooklyn and the Bronx.
-
Impact on Consumers and Companies:
- Esther Fung (09:18): Notes that logistical digitization intended to enhance customer convenience inadvertently created loopholes exploitable by criminals. Both FedEx and AT&T have suffered millions in losses due to these thefts.
-
Preventative Measures by Companies:
- Esther Fung (10:31): Reports that FedEx and AT&T are continuously updating their security protocols without disclosing specifics to avoid aiding bad actors. They encourage customers to report stolen packages immediately to facilitate quicker responses.
-
Consumer Protection Tips:
- Esther Fung (11:21): Advises consumers to opt for direct store pickups when possible, require package signatures, leave notes instructing delivery personnel to notify upon arrival, and remain vigilant about package drop-offs to minimize theft risks.
Notable Quotes:
- Esther Fung (06:56): “This is really a sophisticated, coordinated effort to swipe thousands of devices from people across the US and then sell them abroad.”
- Esther Fung (11:21): “If you can pick up a valuable package from the store directly, I would say go ahead and do that... You might get an email alert on your phone, but you might not get it immediately or you might ignore it because you are distracted.”
4. Conclusion
This episode of the WSJ Tech News Briefing highlights the dual-edged nature of technological advancements. On one hand, companies like Zoox are pushing the boundaries of innovation with a focus on safety and thoughtful deployment. On the other, malicious actors exploit technological systems and insider access to perpetrate large-scale thefts, underscoring the need for robust security measures and consumer vigilance.
Produced by Jess Jupiter. For more in-depth discussions and updates, tune into the full episode of Bold Names and explore additional resources in the show notes.
