Bonum Certa Men Certa

Microsoft Moles Galore

Close-up of a mole



Summary: Former Microsoft employees (or existing ones) who have a lot of influence are being tracked for their impact on other companies or establishments to be understood

IN the previous post we showed how Microsoft entryism at Amazon led to severe consequences (Microsoft also hijacked Yahoo! through personnel). This post accumulates new examples from the past couple of weeks -- examples where prominent Microsoft employees are entering companies/entities other than Microsoft.



Here is a U.S. Forensic Technology Solutions Practice getting 'poisoned' by Microsoft staff:

Edward Gibson, Former Chief Cyber Security Advisor for Microsoft LTD in the U.K., Joins PricewaterhouseCoopers' U.S. Forensic Technology Solutions Practice



PricewaterhouseCoopers LLP (PwC) announced today that Edward Gibson, the former Chief Security Advisor for Microsoft LTD in the United Kingdom, has joined the firm as a director in PwC's U.S. Forensics Technology Solutions practice. Mr. Gibson will focus on helping organizations with issues involving investigating economic espionage, complex money laundering, cyber fraud schemes and intellectual property theft. He will be based in PwC's McLean, VA (Tysons Corner) office and will service a wide range of clients in matters of security breach investigation and overall risk management strategies.

While serving as Microsoft's Chief Cyber Security Advisor in the U.K., Mr. Gibson was the chief spokesperson and point of contact for Microsoft Ltd U.K. on all matters of cyber security and IT infrastructure risk management for global businesses based in the U.K., government, law enforcement and security services, press and consumers.


Another new example:

Singapore based Georgie Farmer, Asia Travel Manager, Microsoft, was unanimously appointed to a second term as Regional Chair, ACTE Asia-Pacific by the Association of Corporate Travel Executive’s (ACTE) Board of Directors during a 20 January meeting.


Juniper has absorbed several Microsoft executives, including the current CEO [1, 2, 3, 4, 5, 6]. The company recently settled fraud allegations using $169,000,000 and there is the following news: "Juniper Networks Protects Customers from New Microsoft Vulnerabilities"

Microsoft's new guardians, eh?

The Boston press writes about Microsoft's former AstroTurfer Don Dodge [1, 2, 3, 4, 5, 6] and other news sites write about the extension of this Microsoft community of boosters/employees whom Microsoft is trying to keep under control:

Microsoft is telling some of its biggest fans to stay off Twitter for the next few days.

That's because right now Microsoft is holding its annual MVP Summit -- a gathering of over 1,000 people who are, according to Microsoft, "committed to helping others get the most out of their experience with Microsoft products and technologies."


Lastly, former Microsoft employee Howard Schmidt, who is now the US cybersecurity czar [1, 2], is commenting about his former employer in this new interview: [via]

That’s why you see a lot of the activity going on, Microsoft with their End to End Trust program, Oracle, with some of the security programs they’ve got. You see a lot of private industry critical infrastructure owners and operators saying, “Well, we get the message. We understand that we’ve got to do things differently. We’re gonna put a higher priority on security.”


Schmidt worked at Microsoft, so he ought to know that their software is not secure. Brian Valentine, who was a top Windows executive before becoming a top Amazon executive (SVP), said that Microsoft's products "just aren't engineered for security."

Earlier today we explained why Microsoft's failure at security may have cost trillions of dollars. It's because approximately one in two machines is a zombie PC if it runs Windows and the effect it has on online banking gets explained in the following new post:

Man in the Browser a.k.a MITB is a new breed of attacks whose primary objective is to spy on browser sessions (mostly banking) and in that process intercept and modify the web page contents transparently in the background. In a classic MITB attack, It's a very likely that what the user is seeing on his/her browser window is not something which the actual server sent. Similarly, what server sees on the other end might not be what user was intending to send. Why MITB? How different is it from conventional browser hijacking? I'll explain that shortly.


This has a direct effect on the banks. Will the banks mind? Well, sadly enough, they too are connected to Microsoft [1, 2, 3, 4, 5, 6], sometimes owing to Microsoft staff like Susan Hauser who lies on behalf of large banks in order to promote racketeering [1, 2, 3, 4, 5, 6, 7].

Recent Techrights' Posts

Helping Microsoft 'Hijack' Developers (to Make Them Work for Microsoft, Not the Competition)
VS Code is proprietary spyware of Microsoft. Jack Wallen keeps promoting its use.
 
Outreachy, GSoC-mentors & Debian-Private may soon become public records in federal court
Reprinted with permission from Daniel Pocock
Links 28/02/2024: Many War Updates and Censorship
Links for the day
Gemini Links 28/02/2024: Social Control Media Notifications and Gemini Protocol Extended
Links for the day
Links 28/02/2024: Microsoft the Plagiarist is Projecting, Food Sector Adopts Surge Pricing
Links for the day
Gemini Links 28/02/2024: Groupthink and the 'Problem' With Linux
Links for the day
Android Rising (Windows Down to All-Time Lows, Internationally)
This month was a bloodbath for Microsoft
HexChat Looks for Successors to Keep IRC Growing
IRC is far from dead
[Meme] Just Make Him Happy
Y U no produce more monopolies?
End of a Long February
top 10 posts
[Meme] The EPO's Relationship With Patent Examiners
Nobody is "safe"
New Pension Scheme (NPS) at the European Patent Office Explained at the General Assembly
Investing in the future, or...
Donald Trump & FSFE Matthias Kirschner election denial
Reprinted with permission from Daniel Pocock
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Tuesday, February 27, 2024
IRC logs for Tuesday, February 27, 2024
Links 27/02/2024: PlayStation Layoffs and More Oppressive New Laws for Hong Kong
Links for the day
Gemini Links 27/02/2024: Facebook as Containment Field and Depression Driven Development (DDD)
Links for the day
They're Adding Warnings Now: The Site "It's FOSS" is Not FOSS
It's better that they at least explicitly state this
Links 27/02/2024: Nevada Versus End-To-End Encryption, Birmingham Bankrupt
Links for the day
End of an Era
The Web isn't just filled with marketing spam but actual disinformation
[Meme] Onboarding New EPO Staff
You read the patent application and grant within hours
The Legacy Prolific Writers Leave Behind Them
"Free Software Credibility Index" after more than 15 years
The Ongoing Evolutionary Process of News-Reading (or News-Finding) on the World Wide Web
it gets worse
Phoronix in Google News
congratulating or welcoming Embrace, Extend, Extinguish (E.E.E.)
Google Fired Many Employees Working on Google News (Which Had Deteriorated and Became Gulag Noise, Littered and Gamed by Blogspam, Plagiarism, and Chatbot/Translator-Generated Spew), Now Comes the Likely 'Phase-out'
No wonder many yearn for the days of DMOZ and Web directories in general
IRC Proceedings: Monday, February 26, 2024
IRC logs for Monday, February 26, 2024
Over at Tux Machines...
GNU/Linux news for the past day
"It's Obvious There's No Future For Any of Us from Blizzard at Microsoft"
The rumours suggest that more Microsoft layoffs are on the way
[Meme] Who's the Boss?
"I thought EPC governed the Office"
Salary Adjustment Procedure (SAP) at the EPO and Why Workers' Salary is Actually Decreasing Each Year (Currency Loses Its Purchasing Power)
outline and update on a years-old blunder
Exposed: FSFE, Legal & Licensing Workshop (LLW), Legal Network & Modern Slavery
Reprinted with permission from Daniel Pocock