Fulfilling customer requirements is a weapon at IBM

ibm-300x158There are several new data points this week in the ongoing cratering of IBM as an IT vendor. The state of Pennsylvania cancelled an unemployment compensation system contract that was 42 months behind and $60 million over budget. Big Blue has been banned from the Australian state of Queensland after botching a $6.9 million SAP project that will now reportedly cost the people of Queensland $A1.2 billion to fix. That’s some botch. Credit Suisse analyst Kulbinder Garcha says IBM has a cash flow problem and downgraded the stock. At IBM’s Systems & Technology Group, management announced to employees a one week mandatory furlough at the end of […]

Is cyber insurance AAA for data or another back door?

GMCtowA few days ago I promised “tomorrow” a column about the future of data security. Then, just as the electrons were flowing on that DefCon column, I bought on eBay a 1978 GMC Royale motorhome in Bismarck, North Dakota that Channing and I have been trying to bring home ever since. We’ve so far broken down in Fargo, North Dakota (air suspension leak) and Brookings, South Dakota (ignition failure), but are now back on the road headed for California. We met Rick, the tow truck driver who used to be a rodeo bull rider, and Wayne Westerberg, the RV mechanic who gave up his Friday night to get us back on the road. Try Googling […]

The origins of DefCon

malk+bunnyThis week we have the DefCon 20 and Black Hat computer security conferences in Las Vegas — reasons enough for me to do 2-3 columns about computer security. These columns will be heading in a direction I don’t think you expect, but first please indulge my look back at the origin of these two conferences, which were started by the same guy, Jeff Moss, known 20 years ago as The Dark Tangent. Computer criminals and vigilantes today topple companies and governments, but 20 years ago it was just kids, or seemed to be. I should know, because I was there — the only reporter to attend Def Con 1.

In those days there […]

So that’s how H-1B visa fraud is done!

Screen Shot 2013-07-18 at 12.37.22 AMReader Mark Surich was looking for a lawyer with Croatian connections to help with a family matter back in the old country. He Googled some candidate lawyers and in one search came up with this federal indictment. It makes very interesting reading and shows one way H-1B visa fraud can be conducted.

The lawyer under indictment is Marijan Cvjeticanin. Please understand that this is just an indictment, not a conviction. I’m not saying this guy is guilty of anything. My point here is to describe the crime of which he is accused, which I find very interesting. He could be innocent for all I know, but the crime, itself, is […]

Edward Snowden is trying to be Daniel Ellsberg on Twitter

snowdenscreensWhat are the differences between Edward Snowden, the NSA whistleblower, and Daniel Ellsberg, who released the Pentagon Papers back in 1971? Not much, really, but the distinctions that do exist are key:

  1. 1.  Ellsberg, a true product of the establishment he was undermining, had the New York Times and the Washington Post simultaneously releasing in its entirety all that he had to share, while Snowden is dribbling his news through The Guardian and the Post, with neither paper taking much of a legal or ethical stand behind him, much less printing verbatim thousands of pages of classified material as happened with the Ellsberg case in the early 70s. If Snowden is the Ellsberg of this century, […]