Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Businesses IT

Before You Fire the Company Geek 624

An anonymous reader writes "A new 'insider threat' survey by the US Secret Service and Carnegie Mellon University finds that 82 percent of people who hack their company 'exhibited unusual behavior in the workplace prior to carrying out their activities.' A somewhat amusing writeup at washingtonpost.com points to a bunch of more interesting gems hidden deep in the study, including: 'Almost all - 96 pecent - of the insiders were men, and 30 percent of them had previously been arrested, including arrests for violent offenses (18 percent), alcohol or drug-related offenses (11 percent), and non-financial-fraud related theft offenses (11 percent).' The blog post also notes that 86 percent held technical positions at the companies: '...if you're going to fire someone (particularly company geeks who have the motive, means and access to inflict pain on your computer systems) make double sure you cut off their e-mail and network access at the same time you hand them their walking papers.'
This discussion has been archived. No new comments can be posted.

Before You Fire the Company Geek

Comments Filter:
  • by It doesn't come easy ( 695416 ) * on Tuesday May 17, 2005 @12:15PM (#12557076) Journal
    The survey went on to say that the remaining 18 percent of people 'exhibited unusual behavior in the workplace while carrying out their normal daily activities.'

    Don't cha know...
    • by Mad Man ( 166674 ) on Tuesday May 17, 2005 @12:52PM (#12557599)

      Further down in the report... (Score:5, Funny)
      by It doesn't come easy (695416) * on Tuesday May 17, @01:15PM (#12557076 [slashdot.org])

      The survey went on to say that the remaining 18 percent of people 'exhibited unusual behavior in the workplace while carrying out their normal daily activities.'


      The original article states
      "that 82 percent of people who hack their company 'exhibited unusual behavior in the workplace prior to carrying out their activities.'"

      This does not mean that 82 percent of the people who exhibit unusual behavior are going to hack their company.

      That's like some racist bastard saying that because 50% of all homicides in the United States are committed by African-Americans (which is true), 50% of African-Americans are murderers (which is not true).

      Or some leftist bigot claiming that becuase 65% of all homicides in the United States are committed by someone with a firearm (which is true), that 65% of gun owners are murderers (which is not true).

      I'm sure there's a name for this common type of logical fallacy, but I don't have time to look it up.
  • by TripMaster Monkey ( 862126 ) * on Tuesday May 17, 2005 @12:16PM (#12557081)




    "Look...the people you are looking for are the people you depend on. We fix your computers, we update your websites, we route your packets, we patch your servers, we guard your data while you sleep. Do not fuck with us."



    Seriously, though, sabotaging your former or current network is just a plain dumb idea, especially if it is/was your job to keep this sort of thing from happening. In the final analysis, the only real thing an I.T. professional possesses is their reputation. Trash that, and you'll find it difficult to secure further employment.

    • by overshoot ( 39700 ) on Tuesday May 17, 2005 @12:23PM (#12557189)
      In the final analysis, the only real thing an I.T. professional possesses is their reputation. Trash that, and you'll find it difficult to secure further employment.

      Short of a felony conviction, that's hard to do. We're a migratory culture and the fact is that no ex-employer wants to do a competitor a favor by giving them information about a candidate -- especially when any negative comments could result in a lawsuit.

      • by DaveHowe ( 51510 ) on Tuesday May 17, 2005 @12:47PM (#12557518)
        Personally, I wonder how many of the "he must have hacked it when he left" stories are actually the fact that, absent the geek, nobody actually knows what the software does or how to fix it if they mess it up (which was frequent, but they weren't going to report that to their bosses if the geek could fix it for them) - and if the geek was undervalued because his boss thought he did nothing all day, while he was fixing other people's mistakes.

        Not that I have ever been in that position of course :)

        • by doublem ( 118724 ) on Tuesday May 17, 2005 @03:27PM (#12559522) Homepage Journal
          At a previous job, I was the only tech staff member who knew how to clear the transaction logs on MS SQL Server. It's not hard to do, but the network admin couldn't even be bothered to do backups more than once or twice a year, which was part of the SQL Transaction log problem.

          When users started getting "transaction log is full" errors and they turned to me to have it fixed.

          Once the error occurred while I was on vacation, and the server remained down for three days and a weekend until I got back. I was accused of hacking the system. I pointed out that I was in the Middle of New Mexico at the time, about a mile underground. Accusations of setting up a logic bomb (Not the phrases they used, but I'll skip the 20 minutes they needed to describe the concept) flew around for a while.

          In the end, the company owner grudgingly admitted that it was probably a maintenance issue, and them reprimanded me for not "trunting the trees" before I left on vacation.

          So for the remainder of my time there I just made sure to do a full backup and shrink the transaction logs every Friday. Automated backups were not an option, as there was never enough drive space for more than one or two backups, so I had to move the old ones to a USB 1.1 drive first.

          And no, system level automation of such rudimentary tasks was not an option. Don't ask. It's a whole other story.

          So I had no reason to hack the system. All I had to do was leave. Of course I documented everything, but I knew no one would bother reading any of it. This is the company that described programmers as "Glorified Typists."

          I made sure to not even visit their web site after I quit.

          I did however have social contact with a few of the non-it staff members. Seems there were a slew of problems with the servers, specifically with a cryptic error about a transaction log that no one in the company could understand.

          In the end they paid a consulting firm to come in and fix the problem, which I'm assuming meant finally automating the backup process and transaction log shrinking.
        • by v1 ( 525388 ) on Tuesday May 17, 2005 @05:19PM (#12560823) Homepage Journal
          Oh it happens. Happened where I used to work - a new member of the staff (placed in a position of authority) found he had created an intensely hostile work environment. (by pissing off everyone in the building) He quit. I pointed out to our manager (more than once) that we needed to change passwords. "Oh, you don't need to worry about that." was the reply.

          One morning two weeks later the supervisor passwords on all our novell servers suddenly stopped working. Cute trick. We had to hack our own servers to get back in, at all eight locations. Fortunately, only the supervisor accounts he knew about had been changed, which made getting passwords reset much easier because we had a few "service" accounts for our paid support people with supervisor privs.

          Only after that did our I.T. manager agree we needed to change supervisor and dial-in passwords. *sigh*

          It doesn't matter who it is that leaves/quits/fired/whatever, if they had access to passwords, those need to get changed, immediately. Just because a person held a position of authority does not mean there is any reason to trust them with company property after they are gone. Looking back on it, I forgive him for doing it, it was our fault and we got what we deserved by treating security so foolishly. The lesson could have been much more painful.

          I'm against the concept of giving someone the boot without warning though. Funny how companies expect a 2 week (or longer) notice when you're going to cut out, but are perfectly ok with taking your badge at the front door when you come in on a Monday morning. Whenever an employer asks me how much notice I'll give them when I'm headed out, I always say "I'd never give you any less notice than I expect to receive from you." They smile, then they frown. They know how the game works.

          If someone's got it in mind to sabotage the works before they leave, odds are good that they will smell the pink slip before it's handed out, and have ample opportunity to muck with things.
    • Trash that, and you'll find it difficult to secure further employment. Except for those cases where you'll get a glowing recommendation from Intel with the provision that you go to work for AMD...
    • by Sabaki ( 531686 ) on Tuesday May 17, 2005 @12:26PM (#12557228)
      We had a case of layoff sabotage at a company I worked for once. The best part is how we found out -- he bragged about it during an interview. The other company, being friends of ours, let us know.

      I don't think he got that job, either.
    • by Rorschach1 ( 174480 ) on Tuesday May 17, 2005 @12:28PM (#12557257) Homepage
      And anyone with this attitude really needs to read Heinlein's "The Roads Must Roll". Guess what? Your garbage man can take exactly the same attitude. You're not really as powerful or indispensable as you probably think.
    • by netruner ( 588721 ) on Tuesday May 17, 2005 @12:36PM (#12557354)
      Given the fast paced, fix-it-now-clean-it-up-later sloppiness that is prevalent in our industry, it's not too much of a reach to put the following into the code:

      #include "MyHomeDirectory/MegaImportantAndNotCMd.h"

      You could also store config files there and flip that archive flag to "off".

      Folks will get a really nasty surprise when your account is deleted, but was it malice, laziness or just someone constantly running "under the gun"?
      • by greed ( 112493 ) on Tuesday May 17, 2005 @01:07PM (#12557800)
        Folks will get a really nasty surprise when your account is deleted,

        Had a realization about unintentionally creating a situation like that at my previous job.

        All the department's partitions on the AFS and DFS servers were charged to my account--they had no way of assigning space to a group. It was 4:30 PM before a long weekend. Very few people were left in IT.

        I suddenly realized what would happen to all the batch jobs when everything belonging to my account was locked out.

        My manager was able to find someone in IT who could suspend the automatic lockout until they could reassign all the filesystem resources...

  • by eyegor ( 148503 ) on Tuesday May 17, 2005 @12:16PM (#12557084)
    They're assuming we already haven't taken control of everything else... who needs email when you control the elevators and doors... :)
  • Yeah, but... (Score:3, Insightful)

    by bobalu ( 1921 ) on Tuesday May 17, 2005 @12:16PM (#12557085)
    make sure they don't run the email system first.
  • by kob43 ( 513124 ) on Tuesday May 17, 2005 @12:16PM (#12557095) Homepage
    'exhibited unusual behavior in the workplace prior to carrying out their activities.'

    Refering to management?
  • - 96 pecent - of the insiders were men
    - The insiders ranged in age from 17 to 60 years (mean age = 32 years)


    OSTG user statistics (Including Slashdot).
    - 97% of OSTG readers are men
    - average age is 29

    Too bad OSTG doesn't have crime statstics for Slashdot readers :)

    I think we should have this for our next poll!

    Worst arrest of your lifetime:

    1. Never. I'm a law abiding citizen.
    2. Never. I run away.
    3. A few misdemenors
    4. Violent offense
    5. Alcohol or drug-related offenses
    6. Non-financial-fraud related theft offenses
    7. I'm writing this from death row.
    8. I stole the money, burned down the office and now live on a beach in Fiji with my red stapler.
  • by gowen ( 141411 ) <gwowen@gmail.com> on Tuesday May 17, 2005 @12:17PM (#12557105) Homepage Journal
    .. remember to give him a wedgie, for old times sake.
  • You don't need these things. You can almost always rely ona fellow employee to have a weak password - just use theirs. It's really to easy..

  • Well, duh (Score:5, Insightful)

    by Anonymous Brave Guy ( 457657 ) on Tuesday May 17, 2005 @12:18PM (#12557115)
    The blog post also notes that 86 percent held technical positions at the companies: '...if you're going to fire someone (particularly company geeks who have the motive, means and access to inflict pain on your computer systems) make double sure you cut off their e-mail and network access at the same time you hand them their walking papers.'

    Also, if you're going to fire an accountant, it's a good idea to audit the accounts they dealt with particularly carefully, and if you're going to fire a security guard it's a good idea to collect their pass and master keys as they leave.

    Of course, not screwing staff so badly that they are prepared to risk retaliation is also a good move.

  • by glesga_kiss ( 596639 ) on Tuesday May 17, 2005 @12:18PM (#12557119)
    'Almost all - 96 pecent - of the insiders were men, and 30 percent of them had previously been arrested, including arrests for violent offenses (18 percent), alcohol or drug-related offenses (11 percent), and non-financial-fraud related theft offenses (11 percent).'

    Hmm, statistics. I wonder how those numbers compare to people who simply work in IT and don't hack? I'd say 96% being men isn't all that unusual, and I would not be surprised if 11% of the general population has alcohol/drug offences already.

    The problem with stats is that they generally never give you a baseline. Without that they are meaningless.

  • the smart geek (Score:4, Interesting)

    by Turn-X Alphonse ( 789240 ) on Tuesday May 17, 2005 @12:20PM (#12557145) Journal
    The smart geek will keep an emergency back up admin account around. While it may sound like he's planning something evil with it (AKA fuck with me and I fuck you over, which it could be used for). He could also be making sure theres always a back up if things goto hell and someone tries gains access and tries to take out all the admin accounts.

    It's like keeping a spare house key hidden in the garden or getting a second set of keys cut for your car and keeping them in a safe place.
  • New study determines criminals exhibit criminal behavior...
  • by Heliologue ( 883808 ) on Tuesday May 17, 2005 @12:20PM (#12557147)
    ...you don't even have to be capable of hacking anymore. Act strangely enough and you can subtlely extort your company for continued employment. What a great idea!
    • by TripMaster Monkey ( 862126 ) * on Tuesday May 17, 2005 @12:26PM (#12557231)
      Act strangely enough and you can subtlely extort your company for continued employment.

      I've been doing that for years. It's easy. Just get a lot of assorted action figures and display them all around your work area. Then occasionally have disturbing conversations with them...making sure you are overheard.



      "Oh Boba Fett, murder can't always be the answer...what's that, Spawn? But you always agree with Boba Fett!"
    • I've been doing this for years. I leave "Guns and Ammo" and ballistics tables on my desk, when my boss asks me to work late I tell him, no, because that would make me late for my anger management couselling, which would then cut into my time at the gun range.
  • by overshoot ( 39700 ) on Tuesday May 17, 2005 @12:20PM (#12557149)
    Obviously, the most cost-effective strategy is to get rid of any males in IT. 96% means that ditching the guys will get rid of all but 4% of the threats.

    This is, after all, almost an order of magnitude more effective than screening for alcohol, drugs, or felony convictions.

    -+-+-+-+-

    Don't blame me for posting like a PHB. This is how they think, and the fact that it gives them a business excuse to play Charlie with his IT Angels probably won't hurt either.

  • Big surprise (Score:3, Insightful)

    by ShadyG ( 197269 ) <bgraymusic@NOsPaM.gmail.com> on Tuesday May 17, 2005 @12:21PM (#12557155) Homepage
    30 percent of them had previously been arrested


    So you're saying that many of the people stupid enough to get caught, thus contributing to this survey's statistics, had been caught before doing other things? Can you say "self-selecting group"?
  • by PornMaster ( 749461 ) on Tuesday May 17, 2005 @12:21PM (#12557156) Homepage
    Now the good news: almost all of them got caught.

    Well, no... almost all of the ones they know about got caught. How many incidents were simply covered up? How many of the really good ones made it look like a typical software-gone-bad-and-erased-the-data?

    We all know that crime statistics are highly skewed by the reporting process...

  • by yagu ( 721525 ) <yayaguNO@SPAMgmail.com> on Tuesday May 17, 2005 @12:21PM (#12557161) Journal

    I guess I get it as far as policy goes, but I experienced this a year ago from a large corporation when I got laid off... My manager came to my desk and did the perp walk with me to the office. Told me that in the interest of cutting cough costs the company was willing to offer me a one year severance package and let me go.

    I said, "You're offering me a one year severance package???" He looked confused, but said, "yes".

    I said, "Well then I respectfully decline your offer.... I would like to continue working for this company."

    He said, "It's not optional."

    I said, "Then you're not offering anything to me, you are doing something to me."

    A couple of notes about the treatment therein:

    • By the time I got back to my desk, all access was gone to all systems, man they're fast!
    • The one year package turned out to be 60 days pay (required by the federal WARN law), then one month's pay for every year I'd put in.... with a 10 month maximum. I had 21 years, so I got ten months pay plus the sixty days... I consider that a ten month package.
    • I found it interesting that any others with ten years, eleven years, twelve years, thirteen, fourteen, fifteen, sixteen, seventeen, eighteen, nineteen, and twenty years all also got the same package as mine.... so much for any extra benefits for being a long time and loyal employee.
    • No information as to who else was gone was given, and those who would still talk to me (funny how one laid off somehow develops a quick case of leprosy) had no information internally who was laid off -- they could only tell by seeing around them -- no lists were dispersed.
    • Those who may have had info would not give it (a bit of a pain since I no longer had access to directories, phone numbers, etc.) making the process of setting up contacts for references nigh impossible (turned out, my entire management hierarchy was gone... and I never did find out where they all went).
    • I had a few years left for qualifying for full retirement.

    In my career at this company I had received the highest award given by the company and was flown to a special ceremony to present my project and receive that award.

    Bottom line here: you don't have to be a criminal, act like a criminal, or even be suspected of being a criminal to be treated like one....

    • He was offering you a severance package, and forcing you to quit.

      You're lucky he didn't say, "You want to decline the severance package? Okay...don't let the door hit you on the way out..."
    • The one year package turned out to be 60 days pay (required by the federal WARN law), then one month's pay for every year I'd put in.... with a 10 month maximum. I had 21 years, so I got ten months pay plus the sixty days... I consider that a ten month package

      I'm not disputing that you were treated badly, but why do you call 12 months of pay a ten-month severance package? If all you got was the legally-required two months of pay, would you say you got no severance?

      The government's mandate of two months
    • by Colin Smith ( 2679 ) on Tuesday May 17, 2005 @12:34PM (#12557333)
      In business, loyalty has a dollar value. Mention that to your management at least once a year.

    • by IpSo_ ( 21711 ) on Tuesday May 17, 2005 @01:01PM (#12557716) Homepage Journal
      How does this classify as being treated like a criminal? I always get a kick out of employees who constantly complain about no loyality left in the work place, and how bad they are always treated.

      Were you in handcuffs and a orange jump suit? Put in to a police car with lights and sirens running? C'mon.

      Put yourself in the companies shoes for once.

      1. Companies are required BY LAW to give severance pay and/or notice when laying off employees. Employees can just up and leave any minute they choose for the most part. Not only that, a lot of employees that at least have the decency to give notice are usually an order of magnitude less productive in those last couple weeks. In the companies eyes it would have been less expensive to just leave and not give any notice.

      2. If a company is getting rid of an employee, don't you think its in their best interest to not take ANY chances? It doesn't matter if you've worked there 50 years or not, they owe it to their customers and other employees to remove your access and get you out of the building ASAP, "just in case". It only takes one bad apple to cause major havoc.

      3. Companies have a lot of people to keep in mind when they do business. Share holders, employees, customers. If a company is experiencing hard financial times, in a lot of cases (not all of course) it makes sense to get rid of the highest paid people. If you've been there for 10 years, not only are you normally get paid more then other people, you also get more time off, and require more severance pay. Since getting rid of one high paid employee can in a lot of cases fund two lower paid ones, it also doesn't look as bad to the public. Also because of the severance pay requirements, sometimes companies have to think years in advance, especially in your case. If you have to pay out 12months worth of wages to get rid of someone, you better make sure you do it at the right time and not wait until its too late.

      Yes, some companies are evil, but put yourself in their shoes sometimes.
      • by yagu ( 721525 ) <yayaguNO@SPAMgmail.com> on Tuesday May 17, 2005 @01:11PM (#12557844) Journal
        it makes sense to get rid of the highest paid people. If you've been there for 10 years, not only are you normally get paid more then other people, you also get more time off, and require more severance pay. Since getting rid of one high paid employee can in a lot of cases fund two lower paid ones, it also doesn't look as bad to the public.

        What you are describing is evil.... what's more, it is illegal. Companies today pay millions to their legal staff to ensure when they do lay off that their numbers will pass legal muster, but that's about all they do. It's well documented (I can cite the research, ahem, and have done some on my own) how difficult it is to prove age discrimination, but plain and simple, this is what it is. And, it is still illegal.

      • by sploxx ( 622853 ) on Tuesday May 17, 2005 @02:38PM (#12558910)
        Yes, some companies are evil, but put yourself in their shoes sometimes.
        That sounds like you want to see a company as a person, what it isn't.

        Although I also personally don't like people who always complain about this and that (which IMHO isn't the case here), I think I can't in any case have sympathy with an entity that is only there to produces things in the most efficient way.
    • by Ironsides ( 739422 ) on Tuesday May 17, 2005 @01:03PM (#12557736) Homepage Journal
      This sounds suspiciously like something that happened to my uncle when he got near retirement age. Some companies will (aparently) fire employees getting near retirement age so they don't have to pay the pension (or similar retirement plan). They say it is something else so they can have some reason to try to cover their asses legally. (Firing based on age is illegal).

      Not sure if this was the case, but it seems similar.
    • I had a company cut my access like that...Problem was, they didn't check to see if I was still logged on under any user names other than my own.

      Root, for example.

      Good thing for them I'm honest.
    • Someone mod this +1 Bitter.

      If you got 12 months severance (I'm sorry, 10 months + 60 days) then you got off a lot better then some people.
  • 82 percent of people who hack their company 'exhibited unusual behavior in the workplace prior to carrying out their activities.'

    Unusual behaviour? How do you define that, especially considering the fact that we are talking about geeks here? I, for one, would not want to meet your average geek acting more unusally than usual in a dark alley. Unless unusal behaviour among geeks is acting usually, of course. Then I'd invite them over for tea.

  • by Blitzenn ( 554788 ) * on Tuesday May 17, 2005 @12:21PM (#12557165) Homepage Journal
    "30 percent of them had previously been arrested, including arrests for violent offenses (18 percent), alcohol or drug-related offenses (11 percent), and non-financial-fraud related theft offenses (11 percent)."

    These numbers also represent the population of the United states as a whole. Yes 30 percent of the US population has been arrested before. more than 20% have a felony on their record and so on. So to paint these people as anything other than ordinary citizens is silly. They simply represent the whole equally as the whole represents itself. Nothing unusual here.
    • Prove it.... (Score:3, Interesting)

      by aquarian ( 134728 )
      These numbers also represent the population of the United states as a whole. Yes 30 percent of the US population has been arrested before. more than 20% have a felony on their record and so on.

      I call BS on this one. Prove it.

      I don't know what the actual numbers are, but I know you're way off. A good friend of mine was a police officer in an anti-gang unit in southern CA. Even within bad neighborhoods the statistics weren't this bad.
    • For those clamoring for stats:

      http://www.csmonitor.com/2003/0818/p02s01-usju.ht m l [csmonitor.com]

      If current trends continue, it means that a black male in the United States would have about a 1 in 3 chance of going to prison during his lifetime. For a Hispanic male, it's 1 in 6; for a white male, 1 in 17. ..
      An estimated 4,299,000 former prisoners are still alive..By 2010, the number of American residents in prison or with prison experience is expected to jump to 7.7 million, or 3.4 percent of all adults, according t
  • Bad math? (Score:5, Interesting)

    by aralin ( 107264 ) on Tuesday May 17, 2005 @12:23PM (#12557180)
    • 49 subjects
    • 84% were acting wierd
    • 85% had documented grievances

    So 41.16 were acting wierd, 41.65 had grievances?

    And 100% researchers show signs of random rounding up or down based on mood even within a single study.

    • Re:Bad math? (Score:4, Insightful)

      by FirstTimeCaller ( 521493 ) on Tuesday May 17, 2005 @03:44PM (#12559717)

      OK, I was about to make a wise-ass remark along the lines of...

      So you'd no doubt prefer to see:
      83.673469387755102040816326530612% were acting weird.
      85.714285714285714285714285714286% had documented grievances.

      But then I realized that you had a point (other than just bitching about imprecise percentage figures). If 41 people is 84% of the total (I'm cool with that rounding), then wouldn't 42 people have to be 86%?!

      The only other possible explaination (other than illnumeracy) is that 85% of the 84% that acted weird had documented grievances (i.e. 35 of them).

  • I think that the submitter of the article wanted to say "angry nerds" and not "company geeks" in the title. Every single company geek that I've ever known was a harmless person who did not mind being overemployed and undervalued. Nerds, on the other hand, did not last too long due to their inability to socialize and fit into office culture.

    For this particular reason, I prefer not to deal with zealots or opinated freaks who are usually easy to spot during the first round of interviews. So far, it was easy

  • It's worse than that (Score:3, Interesting)

    by Colin Smith ( 2679 ) on Tuesday May 17, 2005 @12:27PM (#12557240)
    If you're firing a administrator you really have to go through the entire network they had access to and check every system for things like email responders, cron jobs, scripts. Ugh it's a huge task. It's really fairly simple to add a difficult to find backdoor to someones network.

  • Coincidence (Score:2, Informative)

    That's quite coincidental. The company I work for fired a sys admin last week for drug abuse, and we are at this very second combatting a DoS attack from him. He's also using our servers to route spam to all over the place hoping to get our servers listed on spam blacklists so that we can't use corporate mail.
  • I'm suprised to find (just checked) that my former boss, in a small business I sysadmin'd at, still has the same email password - 1.5 years after me being laid off. Even thou I remember the pswd it remains confidential, w/ no reason for abuse (the drop off in business wasn't his fault, and they treated me pretty good during the good times).

    Just wish someone there had the sense to take care of such things!

  • When I fired the sysadmin, we not only cut off all of her email and network access, we forced a 100% password change to trigger immediately, and manually went to everyone with VPN access and watched them do it right at that moment with secure passwords that we assigned to them.
  • by GPLDAN ( 732269 ) on Tuesday May 17, 2005 @12:28PM (#12557265)
    Here's what the survey doesn't say. That sometimes employers decide to retaliate against employees who point out problems or cause what management thinks is trouble. These employees often find themselves the targets of investigations.

    All surveys like this do is give ammunition to corporate management to investigate who they want, when they want, expect even less privacy and create conditions of employment so egregrious that the IT worker becomes chattel.

    As it is, there are systems to monitor web surfing, chat conversations, phone conversations, VOIP decoders for phone conversations that aren't analog, cameras, keystroke loggers, mail server agents that look for keywords, policies against the use of encryption, etc etc.

    With blood tests and mandatory screenings for crime history, blood history, pretty soon genetic history of family disease (company insurance is expensive you know they don't need any cancer heads) there will be no part of a worker's life that isn't controlled by the corporation that employs them.

    Surveys like this one cull fear in IT shops, fear of insider attacks, of competitive disadvantage brought about by unscrupulous employees. When, in fact, it's employers for the most part who engage in espionage and frame workers. It's easy and efficient. Want to get rid of that guy nearing his pension? Put some kiddie porn on his hard drive.

    We don't need any more tools to spy. We need some fucking national legislation to curb the uncontrolled police state that exists inside the corporations of the world.
    • Corporate States (Score:3, Interesting)

      by Pfhorrest ( 545131 )
      We don't need any more tools to spy. We need some fucking national legislation to curb the uncontrolled police state that exists inside the corporations of the world.

      This is getting a bit off topic and political/philosophical, but this type of thing is why I've been advocating a system of law that holds all officially organized groups of people - government bodies, corporations, unions, same difference - to the same rules and standards. When we've got global corporations with as many people as some states
  • Higher capacity (more than ten) clips are now more available due to a recent law change. Hollow points aimed at chest and head should achieve a good kill count, while the limbs will just result in a lot of injuries. Ideally you should finish your spree with a suicide. Aim the barrel into your mouth pointing upwards. Obliterate the brainstem.

    Using ear protection and even body armor is recommended. You don't want any discomfort before you kill yourself.
  • by astro_ripper ( 884636 ) on Tuesday May 17, 2005 @12:30PM (#12557297) Homepage Journal
    "...if you're going to fire someone (particularly company geeks who have the motive, means and access to inflict pain on your computer systems) make double sure you cut off their e-mail and network access at the same time you hand them their walking papers."

    'Uh, Ted, as our only IT guy, could you go ahead and disable your own e-mail and network access; we're firing you this afternoon.'

  • How to fire a geek (Score:5, Insightful)

    by mnmn ( 145599 ) on Tuesday May 17, 2005 @12:43PM (#12557447) Homepage
    The steps beyond walking him out should be done by another techie, and not just an MCSE.

    ALL passwords should be obtained before he leaves, and ALL should be changed immediately to randomized strings.

    All user accounts should be audited.. if its not supposed to be there, remove it or change its passwd.

    Audit all incoming ports.

    Force EVERYONE at the company to change their passwords to newer better ones. Any techie at a company remembers many others' passwords, especially if its like their last name etc.

    Take immediate backups of important servers and keep em seperate.

    Or you could simply give him a fat severance package.
  • by aquarian ( 134728 ) on Tuesday May 17, 2005 @12:43PM (#12557465)
    ...if you're going to fire someone (particularly company geeks who have the motive, means and access to inflict pain on your computer systems) make double sure you cut off their e-mail and network access at the same time you hand them their walking papers.'

    It seems to me the real way to address the problem is to do a background check when you hire these people.
  • by iamacat ( 583406 ) on Tuesday May 17, 2005 @12:45PM (#12557489)
    If a company is above board and decent dealing with employees, it will seldom encounter insider attacks and will be fully justified prosecuting them. Notify an employee of an impending layoff when the decision is made. Don't give bogus performance reviews just so that you can fire someone without giving them the severance package. Don't expect people to work overtime training their overseas replacements.

    On the other hand, companies that use underhanded tactics should be barred from suing ex-employees that are doing things just comparable in sleaziness. Don't expect to get back those nice gadgets that he took home :-)
  • They collected the data but then jumped to a very wrong conclusion and issued a prescription that, IMHO, will cause MORE harm to companies than it will prevent.

    The "geek" who has been a major player in running the show will be able to break in and do harm if he wants to. If he's of a criminal or revenge-prone he may already have installed a bunch of stuff - and if he's just doing his job he probably has emergency backdoors and the like in case the normal paths break.

    And while ordinary users may not have this sort of access, many of them WILL have been able to accumulate other users' passwords and the like. They too can get in and do damage.

    IF you motivate them.

    The decision is between giving them notice and an opportunity to gracefully disengage from the company, versus pulling the plug and THEN telling them they're fired. The gentle departure versus the knife in the back.

    As someone who has been in the business for decades, I have been laid off from time to time. The usuall procedure has been to give notice and allow the soon-to-be-ex employee to gracefully shut down or redirect his correspondence, clean out his virtual desk, and take advantage of the company email for the first phase of his job hunt. Doing this creates warm fuzzies all around - the social net is intact, mutual recommendations will be forthcoming at all opportunites, if the company ever had need for me again (eventually it did) I'd hire on with no qualms.

    Exactly ONCE I've had the no-notice shutdown. By a PHB who did it that way "because that's how it's done". (No doubt he'd seen trade journal articles like the one above.)

    I was furious.

    I COULD have done major damage to the company's IT infrastructure - but for my scrupulous honesty in business dealings (even with scumbags).

    As it was, when the PHB in question later did a startup and found himself in need of my talents, I didn't even bother to reply to his offer. How can you trust someone like that? You can imagine how I advised anyone considering hiring him or going to work for him.

    Now imagine doing that to someone who is not just able, but willing, to take revenge for any slight. These people are NOT rare - if you have a hundred employees, chances are you have at LEAST one.

    As a friend who was a union organizer once said to me: "The workers will give you what you ask them for. Ask for quantity and you get quantity. Ask for quality and you get quality. Ask for trouble and you get trouble."

    The surprise plug-pull is asking for trouble.

  • by hacker ( 14635 ) <hacker@gnu-designs.com> on Tuesday May 17, 2005 @03:12PM (#12559346)

    My wife works for [insert biggest pharma company in the world here], and has for about 6 years. I used to work for them as well for 5-6 years myself. They were good when I was in, then things got "International", and I resigned quick before the walls started coming down.

    In my wife's department (Cancer Biology), there are people who have been there for literally decades. They're so entrenched, they know every system, process, procedure ever made there. If you want to know an answer to some complicated question, these people will know it... and if they don't, they definately know who WILL know.

    One person in particular had been there for 34 years, 11 months.. and they were going around looking for ways to "cut costs" in her department.

    When you retire at 35-years or more into $PHARMA, you get a nice fat severance. Something like $100k/year for every year there + your stock earnings and benefits cashed out, which amounted to over $1M for this person. That's $100k * 35 + $1M (that's over $4.5M total to retire upon).

    They fired him...

    ...30 days before his 35-year anniversary with the company. He got $60k total as a severance. They didn't want to have to pay out his retirement and severance, so they let him go 4 weeks before he would have earned it. If he had known, he probably could have used up 4 weeks of his vacation to eat up the time instead, but he never saw it coming. Nobody did.

    ... after putting in 35 years with the company .

    This kind of stuff sickens me.

  • by payndz ( 589033 ) on Tuesday May 17, 2005 @03:23PM (#12559467)
    Almost all - 96 percent - of the insiders were men

    One of the remaining 4% was Chloe O'Brian from '24'. And now that she knows how to use a machine gun, nobody dare fire her!

Some people claim that the UNIX learning curve is steep, but at least you only have to climb it once.

Working...