A software developer for Verizon named “Bob” decided that all he wanted to do was browse the web all day and get paid a programmer’s salary for it. Well, it came back to bite him because his somewhat smart idea was stupidly implemented. “Bob” made six figures with Verizon, but paid a Shenyang consultant firm one-fifth his salary to do his job.
Seems like a pretty good idea at first, right? What started off as a good business venture quickly turned south when this genius decided to FedEx his personal network security RSA token key fob out to the Chinese. He also gave them his username and password. They would login under his credentials and it would seem that “Bob” was working from 9-to-5.
Still sounds legit? Well maybe “Bob” hasn’t been keeping up with the tech news lately, but China is constantly launching cyber attacks against American targets. They are hacking 24/7 to try to access anything and everything. (They recently were successful in an 18-month long attack on British Aerospace (BAE), a US government contractor, and obtained classified data on the F-35 fighter jet, the newest in America’s arsenal.) So when a company’s network security staff sees a spike in traffic coming from China, they investigate it! When security determined that “Bob’s” credentials were being used, he’s the first one they went to see. He should have just given them a task, requirements, and a schedule. Then they could have sent him some code, and he could have logged in himself and submitted the work. That would have been a better plan!