Feeds

SA copper thieves bid for Darwin glory

Lesson in how electricity works learned a little too late

The Power of One Infographic

Two South African men with an evidently scant knowledge of how electricity works were this morning killed while attempting to make off with copper power lines by pulling the cables with wires while standing on the ground.

According to the BBC, the pair aged between 25 and 30 made their pitch for Darwin Award immortality at first light today near Johannesburg. Percy Morokane of the Johannesburg Emergency Management Services told the Beeb that while copper theft is not "an everyday occurrence", it is a problem.

Scrap yards buy the half-inched metal and sell it abroad, although it often comes at a higher price to thieves, since "in 70 per cent of reported cases of cable theft, suspects are either killed or maimed", as Morokane explained.

He concluded: "It's a very tricky and dangerous exercise. They lack skill and expertise to work with electric equipment."

The problem of copper theft is fast becoming a world-wide issue, as prices skyrocket. As we reported last August, US communications services outfit Embarq went as far as to offer a $5,000 bounty to nail Las Vegas ne'er-do-wells who'd cost the company a cool $400,000 in swiped cables.

Wisely avoiding high-voltage installations, the perps apparently often "drive vans, don hard hats and scale telephone poles, in an attempt to blend in with legitimate telephone workers", before simply making off with their booty.

In Spain, meanwhile, organised gangs are increasingly targeting copper-rich transformer installations - mainly those used in rural areas to power irrigation pumping systems. While the thieves might get 400 or 500 Euros for their haul, the damage they cause in extracting the equipment often runs into thousands.

There's a recent report into just such a theft here (in Spanish, from the Correo de Zamora), which shows what was left after the copper bandits "cut the cables, totally dismantled the transformer and stole some components and the copper". ®

Seven Steps to Software Security

More from The Register

next story
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Yahoo! Japan! launches! service! for! the! dead!
If you're reading this email, I am no longer alive
Plucky Rockall podule man back on (proper) dry land
Bold, barmy Brit adventurer Nick Hancock escapes North Atlantic islet
NSA man: 'Tell me about your Turkish connections'
Spooks ask Dabbsy to suggest a nice hotel with pool
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.