Former SoftBank employee Provide information on communication equipment to Russian side or January 26 at 5:26

k10012259221_202001260522_202001260523.mp4

In a case where a former employee of Softbank was arrested for illegally extracting confidential information from the company, it was found that information extracted related to communication equipment such as telephone base stations was found in interviews with investigators and others Was. The former employee has stated that he has given the information to the staff of the Russian Trade Representative in Japan, and the Metropolitan Police Department has a policy of elucidating it as a spy operation by Russia.

Former SoftBank employee Yutaka Araki, 48, was arrested by the Metropolitan Police Agency on February 25 in February last year for accessing the company's server and illegally obtaining confidential information, alleging a violation of the Unfair Competition Prevention Law. .

According to previous investigations, former employees have stated that they had given confidential information to staff in the 50s of the Russian Trade Representative in Japan, and the Metropolitan Police suspected that former employees who had already returned had been involved. For that matter, he has requested the Russian side to appear on the Russian side through the Ministry of Foreign Affairs.

Interviews with investigators and others revealed that subsequent investigations revealed that the extracted information appeared to be related to telecommunications equipment, such as telephone base station maintenance and work procedures.

Softbank commented that it did not include "sensitive information," but investigators said communications were critical infrastructure and information targeted by espionage.

In response to the investigation, former employee Araki stated that he had received cash from the staff of the Russian Trade Representative, and the Metropolitan Police Department is planning to elucidate the entire situation as a spy activity by Russia.