EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

02.23.10

Microsoft Moles Galore

Posted in Finance, Microsoft, Security, Windows at 4:54 pm by Dr. Roy Schestowitz

Close-up of a mole

Summary: Former Microsoft employees (or existing ones) who have a lot of influence are being tracked for their impact on other companies or establishments to be understood

IN the previous post we showed how Microsoft entryism at Amazon led to severe consequences (Microsoft also hijacked Yahoo! through personnel). This post accumulates new examples from the past couple of weeks — examples where prominent Microsoft employees are entering companies/entities other than Microsoft.

Here is a U.S. Forensic Technology Solutions Practice getting ‘poisoned’ by Microsoft staff:

Edward Gibson, Former Chief Cyber Security Advisor for Microsoft LTD in the U.K., Joins PricewaterhouseCoopers’ U.S. Forensic Technology Solutions Practice

PricewaterhouseCoopers LLP (PwC) announced today that Edward Gibson, the former Chief Security Advisor for Microsoft LTD in the United Kingdom, has joined the firm as a director in PwC’s U.S. Forensics Technology Solutions practice. Mr. Gibson will focus on helping organizations with issues involving investigating economic espionage, complex money laundering, cyber fraud schemes and intellectual property theft. He will be based in PwC’s McLean, VA (Tysons Corner) office and will service a wide range of clients in matters of security breach investigation and overall risk management strategies.

While serving as Microsoft’s Chief Cyber Security Advisor in the U.K., Mr. Gibson was the chief spokesperson and point of contact for Microsoft Ltd U.K. on all matters of cyber security and IT infrastructure risk management for global businesses based in the U.K., government, law enforcement and security services, press and consumers.

Another new example:

Singapore based Georgie Farmer, Asia Travel Manager, Microsoft, was unanimously appointed to a second term as Regional Chair, ACTE Asia-Pacific by the Association of Corporate Travel Executive’s (ACTE) Board of Directors during a 20 January meeting.

Juniper has absorbed several Microsoft executives, including the current CEO [1, 2, 3, 4, 5, 6]. The company recently settled fraud allegations using $169,000,000 and there is the following news: “Juniper Networks Protects Customers from New Microsoft Vulnerabilities”

Microsoft’s new guardians, eh?

The Boston press writes about Microsoft’s former AstroTurfer Don Dodge [1, 2, 3, 4, 5, 6] and other news sites write about the extension of this Microsoft community of boosters/employees whom Microsoft is trying to keep under control:

Microsoft is telling some of its biggest fans to stay off Twitter for the next few days.

That’s because right now Microsoft is holding its annual MVP Summit — a gathering of over 1,000 people who are, according to Microsoft, “committed to helping others get the most out of their experience with Microsoft products and technologies.”

Lastly, former Microsoft employee Howard Schmidt, who is now the US cybersecurity czar [1, 2], is commenting about his former employer in this new interview: [via]

That’s why you see a lot of the activity going on, Microsoft with their End to End Trust program, Oracle, with some of the security programs they’ve got. You see a lot of private industry critical infrastructure owners and operators saying, “Well, we get the message. We understand that we’ve got to do things differently. We’re gonna put a higher priority on security.”

Schmidt worked at Microsoft, so he ought to know that their software is not secure. Brian Valentine, who was a top Windows executive before becoming a top Amazon executive (SVP), said that Microsoft’s products “just aren’t engineered for security.”

Earlier today we explained why Microsoft's failure at security may have cost trillions of dollars. It’s because approximately one in two machines is a zombie PC if it runs Windows and the effect it has on online banking gets explained in the following new post:

Man in the Browser a.k.a MITB is a new breed of attacks whose primary objective is to spy on browser sessions (mostly banking) and in that process intercept and modify the web page contents transparently in the background. In a classic MITB attack, It’s a very likely that what the user is seeing on his/her browser window is not something which the actual server sent. Similarly, what server sees on the other end might not be what user was intending to send. Why MITB? How different is it from conventional browser hijacking? I’ll explain that shortly.

This has a direct effect on the banks. Will the banks mind? Well, sadly enough, they too are connected to Microsoft [1, 2, 3, 4, 5, 6], sometimes owing to Microsoft staff like Susan Hauser who lies on behalf of large banks in order to promote racketeering [1, 2, 3, 4, 5, 6, 7].

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Links 27/8/2014: GNU/Linux in Space, China, LinuxCon

    Links for the day



  2. FUD Against Google and FOSS Security Amid Microsoft Windows Security Blunders

    In the age of widespread fraud due to Microsoft Windows with its back doors there is an attempt to shift focus to already-fixed flaws/deficiencies in competitors of Microsoft



  3. Microsoft Spin Watch: IDG Turns to More Microsoft Propaganda, Hires Microsoft Boosters

    Media in Microsoft's pocket is telling Microsoft's lies and deceives the public for Microsoft's bottom line



  4. Microsoft's Massive Tax Evasion Becomes Better Known

    A new report about Microsoft's admission that it plays dirty tricks with tax (sometimes using moles in government) is increasing awareness of Microsoft's criminal aspects



  5. Links 25/8/2014: China's Linux Revolution Imminent

    Links for the day



  6. Links 24/8/2014: GNU/Linux Specialisation and Benchmarks

    Links for the day



  7. Links 23/8/2014: GNU/Linux Growth

    Links for the day



  8. Microsoft-Funded Attacks on Android Security and Patent/Copyright

    A look back at examples of people who smear Android and are receiving (or received) money from Microsoft



  9. Blowback in Chile and Munich After Microsoft Intervention

    Microsoft's attacks on the digital sovereignty of countries involves lobbying, corruption, an attack on standards (e.g. ODF), an attack on FOSS policies, and even an attack on accurate reporting (truth itself)



  10. The End of Microsoft is Nigh

    A look back at a tough year for Microsoft and a not-so-promising future



  11. Links 22/8/2014: Linux Foundation LFCS, LFCE

    Links for the day



  12. UPS Burned by Microsoft Windows, Gives Away Massive Number of Credit Card Details

    UPS is the latest victim of Microsoft's shoddy back door with software on top of it (Windows); attempts to blame FOSS for data compromise actually divert attention from the real culprit, which is proprietary software



  13. Microsoft's Funding of ALEC and Other Systemic Corruption

    Microsoft role in writing of laws by proxy, via groups such as ALEC



  14. Microsoft is Still Preying on British Taxpayers, Playing Politics

    Some news from the UK showing how Microsoft uses politics to extract money out of taxpayers, irrespective of their preferences



  15. Microsoft's Patent Troll Intellectual Ventures is Collapsing as 20% of Staff Laid Off

    More good news regarding the demise of patents as Microsoft's leading patent proxy is collapsing more rapidly than anyone ever imagined and software patents too are collectively doubted



  16. Links 21/8/2014: Conferences of Linux Foundation, Elephone Emerges

    Links for the day



  17. Links 20/8/2014: Linux Event, GNOME Milestone

    Links for the day



  18. Corruption Watch: Microsoft Lobbying Designed to Kill Chile's Free Software Policy and Promote Microsoft With Subsidies, More Dirty Tricks Emerge in Munich

    icrosoft is systematically attacking migrations to GNU, Linux and Free software, using dirty tricks, as always



  19. Vista 8 Such a Disaster That Even Microsoft Cannot Cope With It, Vapourware Tactics Start Early

    Microsoft's Windows-powered services are failing and Windows gets bricked by Microsoft patches, whereupon we are seeing yet more of Microsoft's vapourware tactics (focusing in imaginary, non-existent versions of Windows)



  20. On BlackBerry and Other Patent Trolls

    A roundup regarding patent trolls, starting with the bigger and latest joiner, BlackBerry's new patents apparatus



  21. Links 19/8/2014: Humble Jumbo Bundle 2 Betrayal, Mercedes-Benz Runs GNU/Linux

    Links for the day



  22. BlackBerry -- Like Microsoft Nokia -- Could be the Next Patent Proxy Troll

    BlackBerry is restructuring for patent assertion (i.e. trolling) in the wake of some alliances with Microsoft



  23. After Microsoft's Soft Bribe Some Non-Technical Deputy Does Not Like Free Software, Microsoft-Linked Media Responds to This Non-News by Making Bogus Claims of Munich Leaving GNU/Linux (Updated)

    The subversive forces that have secretly been attacking Munich over its migration to GNU/Linux (Microsoft press, Gartner, and even HP) are back to doing it while China and Russia follow Munich's lead



  24. Gates Foundation CFO Quits and Debate About Revolving Doors Recalled Amid Systematic and Shrewd Bribery of Public Officials

    More officials step out of the Gates Foundation and their destination is not known yet; Gates continues to corrupt the public sector with his money so as to increase personal gain at taxpayers' expense



  25. Links 19/8/2014: GNU/Linux Raves and Alternative to Proprietary Voice Chat

    Links for the day



  26. Links 18/8/2014: Linux 3.17 RC1, Escalation in Ferguson

    Links for the day



  27. Gartner Group Advocates Using Defective Software With Back Doors

    Despite strong evidence that Microsoft has been complicit in illegal surveillance, Gartner continues to recommend the use of Windows and other espionage-ready Microsoft software



  28. The Microsoft Patent Trolls: Android Extortion, Vringo Versus Google, and Intellectual Ventures

    Roundup of news about patent aggression by Microsoft and some of its proxies



  29. Links 16/8/2014: Microsoft Linux, US Government Turns to Free Software

    Links for the day



  30. Links 15/8/2014: Reiser4 in Headlines Again, GNOME and KDE Events Finish

    Links for the day


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts