Off tópico - Como ganhar a vida de forma fácil e barata
6 mensagens
|Página 1 de 1
Pata-Hari Escreveu:O tipo deveria ser promovido a CEO, já viram o que conseguiria poupar à empresa!? o problema dele é falta de ambição! deveria ter feito em grande escala! shame on you, Bob! what a looser! poderias ser rei do mundo.
Muito gira a história.
"Evidence even suggested he had the same scam going across multiple companies in the area. All told, it looked like he earned several hundred thousand dollars a year, and only had to pay the Chinese consulting firm about fifty grand annually"[/b]
"Sofremos muito com o pouco que nos falta e gozamos pouco o muito que temos." Shakespeare
Off tópico - Como ganhar a vida de forma fácil e barata
O meu sonho era ter um ou dois chineses para fazer o meu trabalho , pagando-lhe 10% do meu salário , seria o melhor trabalhador da empresa , e passaria dias divertidos , afinal isso e possível .
A typical ‘work day’ for Bob looked like this:
9:00 a.m. – Arrive and surf Reddit for a couple of hours. Watch cat videos
11:30 a.m. – Take lunch
1:00 p.m. – Ebay time.
2:00 – ish p.m Facebook updates – LinkedIn
4:30 p.m. – End of day update e-mail to management.
5:00 p.m. – Go home
http://securityblog.verizonbusiness.com ... good-idea/
Case Study: Pro-active Log Review Might Be A Good Idea
Andrew Valentine
January 14th, 2013
With the New Year having arrived, it’s difficult not to reflect back on last year’s caseload. While the large-scale data breaches make the headlines and are widely discussed among security professionals, often the small and unknown cases are the ones that are remembered as being the most interesting from the investigators point of view. Every now and again a case comes along that, albeit small, still involves some unique attack vector – some clever and creative way that an attacker victimized an organization. It’s the unique one-offs, the ones that are different that often become the most memorable and most talked about amongst the investigators.
Such a case came about in 2012. The scenario was as follows. We received a request from a US-based company asking for our help in understanding some anomalous activity that they were witnessing in their VPN logs. This organization had been slowly moving toward a more telecommuting oriented workforce, and they had therefore started to allow their developers to work from home on certain days. In order to accomplish this, they’d set up a fairly standard VPN concentrator approximately two years prior to our receiving their call. In early May 2012, after reading the 2012 DBIR, their IT security department decided that they should start actively monitoring logs being generated at the VPN concentrator. (As illustrated within our DBIR statistics, continual and pro-active log review happens basically never – only about 8% of breaches in 2011 were discovered by internal log review). So, they began scrutinizing daily VPN connections into their environment. What they found startled and surprised them: an open and active VPN connection from Shenyang, China! As in, this connection was LIVE when they discovered it.
Besides the obvious, this discovery greatly unnerved security personnel for three main reasons:
They’re a U.S. critical infrastructure company, and it was an unauthorized VPN connection from CHINA. The implications were severe and could not be overstated.
The company implemented two-factor authentication for these VPN connection. The second factor being a rotating token RSA key fob. If this security mechanism had been negotiated by an attacker, again, the implications were alarming.
The developer whose credentials were being used was sitting at his desk in the office.
Plainly stated, the VPN logs showed him logged in from China, yet the employee is right there, sitting at his desk, staring into his monitor. Shortly after making this discovery, they contacted our group for assistance. Based on what information they had obtained, the company initially suspected some kind of unknown malware that was able route traffic from a trusted internal connection to China, and then back. This was the only way they could intellectually resolve the authentication issue. What other explanation could there be?
Our investigators spent the initial hours with the victim working to facilitate a thorough understanding of their network topology, segmentation, authentication, log collection and correlation and so on. One red flag that was immediately apparent to investigators was that this odd VPN connection from Shenyang was not new by any means. Unfortunately, available VPN logs only went back 6 months, but they showed almost daily connections from Shenyang, and occasionally these connections spanned the entire workday. In other words, not only were the intruders in the company’s environment on a frequent basis, but such had been the case for some time.
Central to the investigation was the employee himself, the person whose credentials had been used to initiate and maintain a VPN connection from China.
Employee profile –mid-40’s software developer versed in C, C++, perl, java, Ruby, php, python, etc. Relatively long tenure with the company, family man, inoffensive and quiet. Someone you wouldn’t look at twice in an elevator. For the sake of case study, let’s call him “Bob.”
The company’s IT personnel were sure that the issue had to do with some kind of zero day malware that was able to initiate VPN connections from Bob’s desktop workstation via external proxy and then route that VPN traffic to China, only to be routed back to their concentrator. Yes, it is a bit of a convoluted theory, and like most convoluted theories, an incorrect one.
As just a very basic investigative measure, once investigators acquired a forensic image of Bob’s desktop workstation, we worked to carve as many recoverable files out of unallocated disk space as possible. This would help to identify whether there had been malicious software on the system that may have been deleted. It would also serve to illustrate Bob’s work habits and potentially reveal anything he inadvertently downloaded onto his system. What we found surprised us – hundreds of .pdf invoices from a third party contractor/developer in (you guessed it) Shenyang, China.
As it turns out, Bob had simply outsourced his own job to a Chinese consulting firm. Bob spent less that one fifth of his six-figure salary for a Chinese firm to do his job for him. Authentication was no problem, he physically FedExed his RSA token to China so that the third-party contractor could log-in under his credentials during the workday. It would appear that he was working an average 9 to 5 work day. Investigators checked his web browsing history, and that told the whole story.
A typical ‘work day’ for Bob looked like this:
9:00 a.m. – Arrive and surf Reddit for a couple of hours. Watch cat videos
11:30 a.m. – Take lunch
1:00 p.m. – Ebay time.
2:00 – ish p.m Facebook updates – LinkedIn
4:30 p.m. – End of day update e-mail to management.
5:00 p.m. – Go home
Evidence even suggested he had the same scam going across multiple companies in the area. All told, it looked like he earned several hundred thousand dollars a year, and only had to pay the Chinese consulting firm about fifty grand annually. The best part? Investigators had the opportunity to read through his performance reviews while working alongside HR. For the last several years in a row he received excellent remarks. His code was clean, well written, and submitted in a timely fashion. Quarter after quarter, his performance review noted him as the best developer in the building.
This entry was posted on Monday, January 14th, 2013 at 2:46 pm and is filed under Editorial. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.
Comments
This is nearly unbelievable. Is he overpayed or are the chinese underpayed? Crazy story indeed.
Posted by: Stephan Schielke on January 15th, 2013 at 9:39 pm
“Quarter after quarter, his performance review noted him as the best developer in the building.”
Elvis has left the building.
Posted by: JoeThePimpernel on January 15th, 2013 at 9:45 pm
So, we’re saying Bob’s activity here was frowned upon? Cause I’m betting no one explicitly mentioned this to him in the interview.
Posted by: James on January 15th, 2013 at 10:09 pm
Pretty cool idea apart from the whole scary critical infrastructure component. Would this be more acceptable (and maybe even encouraged) if there were an NDA in place and the company dealt with comicbooks instead of critical infrastructure?
Posted by: Bob on January 15th, 2013 at 10:26 pm
Sounds like someone read “The 4 Hour Work Week” and decided to try it out…
Posted by: Tony on January 15th, 2013 at 11:25 pm
Sounds like a “4-Hour Workweek” success story.
Posted by: mark zero on January 15th, 2013 at 11:39 pm
Sooo… where’s the problem? He improved his personal profit and the quality and efficiency of his work, obviously. And all that by using standard business practices – get money to do the job, then pay someone else less to actually do it.
This guy is an american hero and deserves a medal. I’d even go so far to call him a modern times Tom Sawyer, but since the chinese didn’t pay HIM to do his work, that’s just a little bit too far off.
Posted by: Unterdosis on January 15th, 2013 at 11:47 pm
ha ha ha smart guy hope they gave him a raise
Posted by: emk on January 16th, 2013 at 12:23 am
The worst part is his job meant something to the country. The best part we actuallu got the best out of China for cheap!
Posted by: neil m on January 16th, 2013 at 12:41 am
So this may have gone unnoticed for longer if the Chinese had come through a locally hosted VPS instead of making a direct connection?
Posted by: Paul on January 16th, 2013 at 1:49 am
Bob should have proxied the contractor’s connection through his home’s network.
Posted by: Djilali on January 16th, 2013 at 1:52 am
Gerät Job Bob!
Posted by: Peter Schmitz on January 16th, 2013 at 1:58 am
Surely that guy has to be promoted to manage a division that outsources sw dev to China. It’s the thing he is obviously very good at.
Posted by: Alice on January 16th, 2013 at 3:13 am
Sounds like they hired a lazy person to do a tech job. Perfect job because, according to Bill Gates, that is exactly what you want to do. “http://www.goodreads.com/quotes/568877-i-choose-a-lazy-person-to-do-a-hard-job” In typical fashion for tech people, he figured out the easiest way to do his job(s). Why is this news? It’s innovative, I’ll give him that. Sounds like he should be a high level manager instead of coding for a living. Maybe this is a clear example why most average people don’t understand tech people.
Posted by: anon coward on January 16th, 2013 at 3:22 am
So…. what was the name of the Chinese firm he was contracting with? They didn’t happen to list a phone number?
Posted by: Tyler on January 16th, 2013 at 3:41 am
So he managed a multi project setup, are able to communicate the requirements to remote “team members”, deals with different time zone, deliver in time, with good quality … Sounds like he was just in the wrong position.
Posted by: ThoMo on January 16th, 2013 at 3:43 am
Disturbing (and a little bit entertaining) has the bones for a Holywood script – would probably go straight to DVD unless they can swing a couple of big stars. Prob need to hold someone hostage to make it really sizzle.
I would be interested to see how this played out from a employment / legal perspective. This chap was caught but how far reaching could this be in other organisations globabally.
Posted by: Andrew on January 16th, 2013 at 5:21 pm
Let me get this straight. When companies outsource employees, that’s just good management, but when employees outsource their companies, that’s bad? Bob deserves a raise, a promotion and a speaking tour for how to improve you personal profits.
Posted by: GPW on January 16th, 2013 at 6:01 pm
Sounds like the perfect candidate for service provider manager or third party account manager. It’s not easy managing third party oursourcing firms to develop something that works.
Posted by: Fariz on January 16th, 2013 at 6:12 pm
Djilali is right. Bob was wise enough to outsource himself, but not smart enough to figure out someone would eventually figure out a VPN connection from China was unusual. There were plenty of ways of avoiding this, but ultimately what he did would have been PERFECTLY legal had he been a sub-contractor himself. Then he could have kept his sub-sub-contracting hidden from the client. Alas, poor Bob, he hardly knew thees.
Posted by: aragond on January 16th, 2013 at 6:48 pm
Boy! Does this give me an idea! LOL, a one day work week, here I come , ,
Posted by: Rocky on January 16th, 2013 at 6:55 pm
So – whole companies can do this to the detriment of the US economy, but a single individual can’t? Noted.
Posted by: Rich on January 16th, 2013 at 6:59 pm
Astonishing how many people want to laud this individual. What he did posed a security risk. I’d hardly compare this with companies outsourcing work. That transaction is quite a bit more direct.
If Bob had been a contractor instead of a salaried employee, this would have been perfectly fine and legal. It’s true that his approach was innovative but, unfortunately, as a salaried employee, it has different ethical implications.
Posted by: Clarissa on January 16th, 2013 at 8:25 pm
Sounds like BS scare-mongering to sell whatever crappy ‘security’ product this company sells. Let me guess – absolutely no public records or proof that this happened?
Posted by: fredo on January 16th, 2013 at 8:56 pm
Think about this: Bob needed to find out a company who’s good on doing this coding job, then negotiate a biz contract with a foreign company, did a perfect project management job remotely, and he had to know how to do the QA job… considering about the barriers of language, timezone, cultural difference… wow he’s more capable on a higher position.
The only frustrated/concerned part is about two key words: US critical infrastructure, China.
BTW I am from China and here developers are discussing this story sadly seeing the payment gap in US vs. China… On a TV interview when a guy was asked ” do you love China, your motherland?” the answer was “yes, that’s why i am planning to immigrate to US: don’t bother this country…”
Posted by: Ray Wang on January 16th, 2013 at 9:21 pm
He should have outsourced to India. No one would have looked twice.
Posted by: Scott on January 16th, 2013 at 9:29 pm
This is clearly a fake story.
It is logically inconsistent. We are told the person worked at his desk all day using social networks, etc. He was *present* at his job. They also say that he worked at this one company for “several years”. But then they also say he did this same scam at “multiple companies” and earned “several hundred thousand dollars a year.” How could he be working at multiple companies, while also at his desk most of the day at one company doing nothing much.
See:
“Evidence even suggested he had the same scam going across multiple companies in the area. All told, it looked like he earned several hundred thousand dollars a year, and only had to pay the Chinese consulting firm about fifty grand annually. The best part? Investigators had the opportunity to read through his performance reviews while working alongside HR. For the last several years in a row he received excellent remarks. His code was clean, well written, and submitted in a timely fashion. Quarter after quarter, his performance review noted him as the best developer in the building.”
Still it is a fun story, and probably has some prescience.
Posted by: Lawrence Sinclair on January 16th, 2013 at 9:54 pm
You can also……. ha ha ha
Posted by: Bob on January 16th, 2013 at 11:53 pm
This story sets off a lot of BS alarms. Seems likely to be at least embellished, if not downright bogus. The “typical work day” stuff sounds particularly fishy.
Posted by: Skeptical on January 17th, 2013 at 12:20 am
Rocky,
Given that the company in question does “critical U.S. infrastructure work”, they couldn’t outsource this themselves.
Posted by: Cybrludite on January 17th, 2013 at 1:15 am
Great approach. Cost savings. Innovation. Wonder if he got a promotion!
Posted by: David on January 17th, 2013 at 2:04 am
Was did his employment contract say? What did the employee say? And obviously the issue wouldn’t have been uncovered if he had actively pulled the results instead of letting the contractors connect to the company VPN.
I do this all the time, reverse-proxying ssh connections to my box camouflaged as a radio stream. Just kidding.
Posted by: hruba on January 17th, 2013 at 2:31 am
Please let me know the company name in china.
Posted by: ikjoon on January 17th, 2013 at 2:34 am
Had he called himself ‘Bob Inc.’ instead of just Bob this would have been the way to do business, maybe he would be employer of the year instead of just best developer. But don’t you dare make money for yourself by abusing of outsourcing mechanism. Unless you are CEO that is.
Posted by: Likeaboss on January 17th, 2013 at 2:55 am
that guy is a real entrepreneur! Economies nowadays can use this sort of persons.
Posted by: fred on January 17th, 2013 at 3:35 am
I personally think this as a fiction as I don’t believe such unethical software engineer exists in America.
Posted by: Shaohong on January 17th, 2013 at 4:26 am
1, Arrive and surf Reddit for a couple of hours. Watch cat videos
2, Take lunch
3, Ebay time.
4, ish p.m Facebook updates – LinkedIn
5, End of day update e-mail to management.
6, Go home
7, ………
8, profit
Posted by: henrik on January 17th, 2013 at 4:30 am
Why for God sake they analyzed PC, files, network topology, segmentation, etc. and did not simply ask him to show his RSA token ?!? I guess they were paid per hour rate ?
Posted by: Ali on January 17th, 2013 at 4:30 am
The story adds a new dimension tho term “Chinese Farmer Gold”
Posted by: A. H. Andersen on January 17th, 2013 at 4:53 am
Dear All
It is clear that artificial barriers can not supercede the natural principles of economics. If the same job could be carried out at 1/3 or 1/4 of the costs in India, there is no way it can be prevented. If companies creates barriers individuals will start doing the same. They will pay 1/4 of their CTC and get some one to logged and do the job. In these days of Mobility and cloud amd social media connections, there is no way companies and countries can control the demographics in Buy side or in sell side. Interconnected world will have different rule of the games.
Posted by: Dheeraj on January 17th, 2013 at 6:06 am
@Rich – It’s always been this way. There is one law for the common man and another law for the monied (corporate) class.
Posted by: p-dawg on January 17th, 2013 at 6:18 am
I really don’t see the big deal. My manager does this outsourcing to me all the time. I would challenge the greedy fatcats to take a bonus cut worth half of what bob makes. They would change their minds immediately.
Posted by: poor working stiff on January 17th, 2013 at 6:31 am
Come on folks, why did you removed my comments about questioning the truth of this hoax?
Anybody believe this is truth need to question the level of idiotness of Bob’s manager and his fellow colleagues. No real software engineer in US will believe in this fiction.
Posted by: Shaohong on January 17th, 2013 at 7:04 am
It would have been even more profitable if he would have done something creative(worthy of earning him something) instead of watching cat videos.. That guys, is the real productivity.. I would have awarded him a medal if he would have done that! Work like this for 5-10 years and then retire to a peaceful life
Posted by: Rhishi on January 17th, 2013 at 7:25 am
To everyone saying he’s a hero and deserves a raise….. I get your point. But there is one important point you all seem to be overlooking:
“They’re a U.S. critical infrastructure company, and it was an unauthorized VPN connection from CHINA. The implications were severe and could not be overstated.”
This almost certainly means that they are privy to United States classified information, and providing VPN access into the network is STEP #1 in the guide to “Making it easy for other nations to subvert the US”.
Posted by: Mike on January 17th, 2013 at 8:05 am
Admit it, you lifted it from this didn’t you?
http://www.theonion.com/video/more-amer ... sea,14329/
I call fake
Posted by: Johnny on January 17th, 2013 at 9:57 am
The reason the Chinese guy could do the work at a quarter the cost might be because he was selling the secrets he obtained on the side!
Posted by: Philbert on January 17th, 2013 at 12:46 pm
We got a modern Ferris Bueller here! Bob for President!
Posted by: RollTide2013 on January 17th, 2013 at 1:24 pm
@Johnny, Good job! I feel the same as you. This story only look real to the people who never worked as a professional software engineer in a real American software company.
My personal experience have told me American software engineers are working just as hard as their Chinese counterpart.
Besides it’s impossible for any software engineer making “several hundred thousand dollars a year” can sit idle in his office day by day. That’s not the way to develop software. It’s simply not real!
Posted by: Shaohong on January 17th, 2013 at 1:32 pm
I think this guy has a brilliant future waiting for him as an elected politician.
Posted by: Reggie on January 17th, 2013 at 3:10 pm
This is outrageous!
Posted by: tech blog on January 17th, 2013 at 3:27 pm
This story reads like it was written by Stephen Glass. I just don’t buy it.
Posted by: Kelly on January 17th, 2013 at 5:01 pm
yep – I call either journalist looking for ‘how far will my story travel’ urban myth status, or promotional piece for the proponents of outsourcing to China.
When I was in Malaysia, there was a news story about a government sponsored prize competition for local programmers for who could write the best simple program to do something in 1 day – many applied – guess what – NOBODY passed – NOBODY managed to write a working program – there’s your quality standard.
Posted by: Frank on January 17th, 2013 at 5:24 pm
I fail to see the problem unless the company has a rule that an employee cannot outsource their own job. Yes, it was infrastructure however, during the entire time this was going on, no damage was done. The employee used his own wages, sorry but this is something that business owners do every single day and because an employee does it this is now wrong?? How many company execs do nothing during their day and make huge figures while their employees do all the work and make less??? Not wrong for an employee to do what companies do every single day and there is no law against it unless his contract specifically states he cannot outsource his job.
Posted by: Raquel Santiago on January 17th, 2013 at 5:36 pm
Please excuse me if I withhold lending credence to this story. First “Bob” is a trusted, relatively well known employee who apparently spends his time on-site in the IT factory grinding out code day-in and day-out. But really from his cubicle he does Reddit, LOLCats and what not. All the while he sends in daily reports of his accomplices’ accomplishments. Of course nobody notices any change in his work product despite it apparently drawing attention to be award winning for its simple elegance.Then we are told “evidence seemed to suggest” he had the scam going at multiple companies in the area. Apparently this guy also can outsource his physical presence. Now that is impressive.
Perhaps this story is a composite of some group that did these things, or it is a hoax. But I am not buying into the story as presented.
Posted by: RJD on January 17th, 2013 at 6:37 pm
I am not surprised by this or the comments. It is why Asian students proudly claim that they are the next super power and America is dying. You should all be so proud to be American…that is sarcasm for the Americans.
Posted by: Jack on January 17th, 2013 at 6:59 pm
Bob sounds like he originated in the movie Office Space. He’s got upper-management written all over him. An innovator, even. Just think of all the money he SAVED the company by outsourcing. Geesh.
Posted by: OPD on January 17th, 2013 at 7:07 pm
Indian workers in us do this all time
Physically in the US recieving code from bangalor via IM cut and paste!
Ask the real quiet reserved indian code jockey at your company to walkthrough his/her code with other american programmers
Posted by: Bob on January 17th, 2013 at 7:50 pm
Funny, when US corporates do this its good business – when ‘Bob’ does it – it’s a security issue. Lol.
Posted by: Ben on January 17th, 2013 at 11:13 pm
Boy that’s just a straight shooter with upper management written all over him!
Posted by: The Bobs on January 18th, 2013 at 12:04 am
I have bought software with source code from Dalian, China before. The price I paid was one fourth what I would have paid for in the U.S..
Posted by: Jacky on January 18th, 2013 at 2:44 am
What kind of a manager would give mid-40 software development professional the performance review comments as “His code was clean, well written, and submitted in a timely fashion”? It’s like telling teenagers they can walk well. It’s almost like an insult.
And the tricky thing here is that the author can refuse to reveal any truth bearing details for “security” reasons. So the story could continue on and on. It reminds me story in which one guy said he was kidnapped and raped by aliens, multiple times! Who can verify this didn’t happen?
Posted by: Shaohong on January 18th, 2013 at 3:00 am
I praise this guy! Why? Because I do something similar! I come to work spend hours on Stack Exchange, Ebay and other garbage. Get bored out of my mind and guess what. My bosses love me! Plus I get paid 3 times the annual average (UK), health benefits loads of holidays and company car. How do i get this right? Simple. I do my job properly! And then I make sure not to hand in sh*t work. Near perfection is my objective. I get it done right the first time round. Get it? Apparently not! When I do work I put 200% in. It generatats income for my company from start and it makes my collegues life easier! Frankly, I think they know I do other work , while I am at work. So I get paid to work. Plus freelance money I do at work. LOL- The rest of you people who diss Bob are Looosesers. Can you say big fat “L” ! Bob is my Idol! The only mistake he made was using VPN instead of SSH tunneling via an internal proxy. Ooops.
Posted by: ppumkin on January 18th, 2013 at 4:26 am
@fredo
You’re the one of the few commentators that are able to think and identify this as a potential hoax. Unfortunately very few percentage of the population are able to do it. People are so prejudicious / superstitious these days.
Posted by: Shaohong on January 18th, 2013 at 6:08 am
May be very interested to get in touch with those excellent coders, as now they have lost a client Seriously !
Posted by: Celeriz on January 18th, 2013 at 7:26 am
Wow.
What’s the real story here? That ‘Bob’ outsourced his work life; whether or not this story is real; or the reckless perspective of so many of the posters to this article?
I say it’s the latter: the reckless and unprofessional perspective tendered by a good many of the posters to this article. The narrow, improperly focused, oblivious, irresponsible, folk-hero-worshipping perspective aired here.
Corporate execs are legally culpable (like it or not) for what goes on within the confines of their org. So if Bob purposely and overtly exposes that org to THE bad actor nation in the world at this time, that’s a bit of a problem. I hope Bob is ready for retirement, ‘cuz when it gets around the C suites that Bob has been threatening the CXX’s way of life for some time now, he may have to see if he can get a job doing maintenance on T-shirt websites.
SDLC anyone?
Posted by: jobewan on January 18th, 2013 at 7:40 am
The guy divulged his user credentials. Who knows what kind of access he had to the network.
Posted by: blutoh on January 18th, 2013 at 7:58 am
“he had the same scam going across multiple companies in the area.”
Scam??? What scam? Isn’t this exactly what management wants to do? The only reason it’s being called a “scam” is that the employee put the outsourcing bonus in his pocket, instead of in management’s.
Why are only management allowed to outsource jobs? If the people doing actual jobs get somebody else to do their work, they are scammers. If management does exactly the same thing, and lays off the employees, they get a bonus.
Posted by: Marc on January 18th, 2013 at 8:41 am
I was in a Verizon security briefing and they used this story. A few things left out where he was physically working in the office yet they saw an active VPN connection using the token from China. Plus I think that company plus the others sued him so I doubt he did so well after.
This happened at least a year ago so this is an old story just it never hit the internet till now.
Posted by: Brett on January 18th, 2013 at 8:44 am
100% lie. For such programming job people get around $100K, not “several hundred thousands”.
Also, to manage and communicate with outsourcing team one needs to spent considerable time and effort. This is a project manager position, which is harder than just to develop code. Finally comes obvious discrepancy in the story. First they said the guy worked 9-5 in the office of his employer company. Second they said that he conducted “the same scum in several companies in the area”. How could he be 9-5 in several places???
This is written by outsourcing advocates to show how stupid and lazy Americans are and how smart are people in China. I know personally how far this is from truth. I was a project manager in USA company managing outsourcing team. It was extremely difficult to get job done ontime with quality.
Posted by: Alex on January 18th, 2013 at 10:20 am
I drew a comic inspired by this guy’s story. Check it!
http://pcweenies.com/2013/01/18/a-bob-b ... ther-name/
Posted by: Krishna Sadasivam on January 18th, 2013 at 10:52 am
Bob is ready to be a CIO!
Ship em ship em ship em ship em ship em overseas.
Posted by: Congrats on January 18th, 2013 at 12:26 pm
Bob has simply elevated himself to project manager.
Posted by: Business guy on January 18th, 2013 at 12:37 pm
Leave a Comment
Name
Mail (will not be published)
Website
All submissions, like other use of this site, are subject to the Terms of Use. By using the site, I agree to those terms.
CAPTCHA Code *
A typical ‘work day’ for Bob looked like this:
9:00 a.m. – Arrive and surf Reddit for a couple of hours. Watch cat videos
11:30 a.m. – Take lunch
1:00 p.m. – Ebay time.
2:00 – ish p.m Facebook updates – LinkedIn
4:30 p.m. – End of day update e-mail to management.
5:00 p.m. – Go home
http://securityblog.verizonbusiness.com ... good-idea/
Case Study: Pro-active Log Review Might Be A Good Idea
Andrew Valentine
January 14th, 2013
With the New Year having arrived, it’s difficult not to reflect back on last year’s caseload. While the large-scale data breaches make the headlines and are widely discussed among security professionals, often the small and unknown cases are the ones that are remembered as being the most interesting from the investigators point of view. Every now and again a case comes along that, albeit small, still involves some unique attack vector – some clever and creative way that an attacker victimized an organization. It’s the unique one-offs, the ones that are different that often become the most memorable and most talked about amongst the investigators.
Such a case came about in 2012. The scenario was as follows. We received a request from a US-based company asking for our help in understanding some anomalous activity that they were witnessing in their VPN logs. This organization had been slowly moving toward a more telecommuting oriented workforce, and they had therefore started to allow their developers to work from home on certain days. In order to accomplish this, they’d set up a fairly standard VPN concentrator approximately two years prior to our receiving their call. In early May 2012, after reading the 2012 DBIR, their IT security department decided that they should start actively monitoring logs being generated at the VPN concentrator. (As illustrated within our DBIR statistics, continual and pro-active log review happens basically never – only about 8% of breaches in 2011 were discovered by internal log review). So, they began scrutinizing daily VPN connections into their environment. What they found startled and surprised them: an open and active VPN connection from Shenyang, China! As in, this connection was LIVE when they discovered it.
Besides the obvious, this discovery greatly unnerved security personnel for three main reasons:
They’re a U.S. critical infrastructure company, and it was an unauthorized VPN connection from CHINA. The implications were severe and could not be overstated.
The company implemented two-factor authentication for these VPN connection. The second factor being a rotating token RSA key fob. If this security mechanism had been negotiated by an attacker, again, the implications were alarming.
The developer whose credentials were being used was sitting at his desk in the office.
Plainly stated, the VPN logs showed him logged in from China, yet the employee is right there, sitting at his desk, staring into his monitor. Shortly after making this discovery, they contacted our group for assistance. Based on what information they had obtained, the company initially suspected some kind of unknown malware that was able route traffic from a trusted internal connection to China, and then back. This was the only way they could intellectually resolve the authentication issue. What other explanation could there be?
Our investigators spent the initial hours with the victim working to facilitate a thorough understanding of their network topology, segmentation, authentication, log collection and correlation and so on. One red flag that was immediately apparent to investigators was that this odd VPN connection from Shenyang was not new by any means. Unfortunately, available VPN logs only went back 6 months, but they showed almost daily connections from Shenyang, and occasionally these connections spanned the entire workday. In other words, not only were the intruders in the company’s environment on a frequent basis, but such had been the case for some time.
Central to the investigation was the employee himself, the person whose credentials had been used to initiate and maintain a VPN connection from China.
Employee profile –mid-40’s software developer versed in C, C++, perl, java, Ruby, php, python, etc. Relatively long tenure with the company, family man, inoffensive and quiet. Someone you wouldn’t look at twice in an elevator. For the sake of case study, let’s call him “Bob.”
The company’s IT personnel were sure that the issue had to do with some kind of zero day malware that was able to initiate VPN connections from Bob’s desktop workstation via external proxy and then route that VPN traffic to China, only to be routed back to their concentrator. Yes, it is a bit of a convoluted theory, and like most convoluted theories, an incorrect one.
As just a very basic investigative measure, once investigators acquired a forensic image of Bob’s desktop workstation, we worked to carve as many recoverable files out of unallocated disk space as possible. This would help to identify whether there had been malicious software on the system that may have been deleted. It would also serve to illustrate Bob’s work habits and potentially reveal anything he inadvertently downloaded onto his system. What we found surprised us – hundreds of .pdf invoices from a third party contractor/developer in (you guessed it) Shenyang, China.
As it turns out, Bob had simply outsourced his own job to a Chinese consulting firm. Bob spent less that one fifth of his six-figure salary for a Chinese firm to do his job for him. Authentication was no problem, he physically FedExed his RSA token to China so that the third-party contractor could log-in under his credentials during the workday. It would appear that he was working an average 9 to 5 work day. Investigators checked his web browsing history, and that told the whole story.
A typical ‘work day’ for Bob looked like this:
9:00 a.m. – Arrive and surf Reddit for a couple of hours. Watch cat videos
11:30 a.m. – Take lunch
1:00 p.m. – Ebay time.
2:00 – ish p.m Facebook updates – LinkedIn
4:30 p.m. – End of day update e-mail to management.
5:00 p.m. – Go home
Evidence even suggested he had the same scam going across multiple companies in the area. All told, it looked like he earned several hundred thousand dollars a year, and only had to pay the Chinese consulting firm about fifty grand annually. The best part? Investigators had the opportunity to read through his performance reviews while working alongside HR. For the last several years in a row he received excellent remarks. His code was clean, well written, and submitted in a timely fashion. Quarter after quarter, his performance review noted him as the best developer in the building.
This entry was posted on Monday, January 14th, 2013 at 2:46 pm and is filed under Editorial. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.
Comments
This is nearly unbelievable. Is he overpayed or are the chinese underpayed? Crazy story indeed.
Posted by: Stephan Schielke on January 15th, 2013 at 9:39 pm
“Quarter after quarter, his performance review noted him as the best developer in the building.”
Elvis has left the building.
Posted by: JoeThePimpernel on January 15th, 2013 at 9:45 pm
So, we’re saying Bob’s activity here was frowned upon? Cause I’m betting no one explicitly mentioned this to him in the interview.
Posted by: James on January 15th, 2013 at 10:09 pm
Pretty cool idea apart from the whole scary critical infrastructure component. Would this be more acceptable (and maybe even encouraged) if there were an NDA in place and the company dealt with comicbooks instead of critical infrastructure?
Posted by: Bob on January 15th, 2013 at 10:26 pm
Sounds like someone read “The 4 Hour Work Week” and decided to try it out…
Posted by: Tony on January 15th, 2013 at 11:25 pm
Sounds like a “4-Hour Workweek” success story.
Posted by: mark zero on January 15th, 2013 at 11:39 pm
Sooo… where’s the problem? He improved his personal profit and the quality and efficiency of his work, obviously. And all that by using standard business practices – get money to do the job, then pay someone else less to actually do it.
This guy is an american hero and deserves a medal. I’d even go so far to call him a modern times Tom Sawyer, but since the chinese didn’t pay HIM to do his work, that’s just a little bit too far off.
Posted by: Unterdosis on January 15th, 2013 at 11:47 pm
ha ha ha smart guy hope they gave him a raise
Posted by: emk on January 16th, 2013 at 12:23 am
The worst part is his job meant something to the country. The best part we actuallu got the best out of China for cheap!
Posted by: neil m on January 16th, 2013 at 12:41 am
So this may have gone unnoticed for longer if the Chinese had come through a locally hosted VPS instead of making a direct connection?
Posted by: Paul on January 16th, 2013 at 1:49 am
Bob should have proxied the contractor’s connection through his home’s network.
Posted by: Djilali on January 16th, 2013 at 1:52 am
Gerät Job Bob!
Posted by: Peter Schmitz on January 16th, 2013 at 1:58 am
Surely that guy has to be promoted to manage a division that outsources sw dev to China. It’s the thing he is obviously very good at.
Posted by: Alice on January 16th, 2013 at 3:13 am
Sounds like they hired a lazy person to do a tech job. Perfect job because, according to Bill Gates, that is exactly what you want to do. “http://www.goodreads.com/quotes/568877-i-choose-a-lazy-person-to-do-a-hard-job” In typical fashion for tech people, he figured out the easiest way to do his job(s). Why is this news? It’s innovative, I’ll give him that. Sounds like he should be a high level manager instead of coding for a living. Maybe this is a clear example why most average people don’t understand tech people.
Posted by: anon coward on January 16th, 2013 at 3:22 am
So…. what was the name of the Chinese firm he was contracting with? They didn’t happen to list a phone number?
Posted by: Tyler on January 16th, 2013 at 3:41 am
So he managed a multi project setup, are able to communicate the requirements to remote “team members”, deals with different time zone, deliver in time, with good quality … Sounds like he was just in the wrong position.
Posted by: ThoMo on January 16th, 2013 at 3:43 am
Disturbing (and a little bit entertaining) has the bones for a Holywood script – would probably go straight to DVD unless they can swing a couple of big stars. Prob need to hold someone hostage to make it really sizzle.
I would be interested to see how this played out from a employment / legal perspective. This chap was caught but how far reaching could this be in other organisations globabally.
Posted by: Andrew on January 16th, 2013 at 5:21 pm
Let me get this straight. When companies outsource employees, that’s just good management, but when employees outsource their companies, that’s bad? Bob deserves a raise, a promotion and a speaking tour for how to improve you personal profits.
Posted by: GPW on January 16th, 2013 at 6:01 pm
Sounds like the perfect candidate for service provider manager or third party account manager. It’s not easy managing third party oursourcing firms to develop something that works.
Posted by: Fariz on January 16th, 2013 at 6:12 pm
Djilali is right. Bob was wise enough to outsource himself, but not smart enough to figure out someone would eventually figure out a VPN connection from China was unusual. There were plenty of ways of avoiding this, but ultimately what he did would have been PERFECTLY legal had he been a sub-contractor himself. Then he could have kept his sub-sub-contracting hidden from the client. Alas, poor Bob, he hardly knew thees.
Posted by: aragond on January 16th, 2013 at 6:48 pm
Boy! Does this give me an idea! LOL, a one day work week, here I come , ,
Posted by: Rocky on January 16th, 2013 at 6:55 pm
So – whole companies can do this to the detriment of the US economy, but a single individual can’t? Noted.
Posted by: Rich on January 16th, 2013 at 6:59 pm
Astonishing how many people want to laud this individual. What he did posed a security risk. I’d hardly compare this with companies outsourcing work. That transaction is quite a bit more direct.
If Bob had been a contractor instead of a salaried employee, this would have been perfectly fine and legal. It’s true that his approach was innovative but, unfortunately, as a salaried employee, it has different ethical implications.
Posted by: Clarissa on January 16th, 2013 at 8:25 pm
Sounds like BS scare-mongering to sell whatever crappy ‘security’ product this company sells. Let me guess – absolutely no public records or proof that this happened?
Posted by: fredo on January 16th, 2013 at 8:56 pm
Think about this: Bob needed to find out a company who’s good on doing this coding job, then negotiate a biz contract with a foreign company, did a perfect project management job remotely, and he had to know how to do the QA job… considering about the barriers of language, timezone, cultural difference… wow he’s more capable on a higher position.
The only frustrated/concerned part is about two key words: US critical infrastructure, China.
BTW I am from China and here developers are discussing this story sadly seeing the payment gap in US vs. China… On a TV interview when a guy was asked ” do you love China, your motherland?” the answer was “yes, that’s why i am planning to immigrate to US: don’t bother this country…”
Posted by: Ray Wang on January 16th, 2013 at 9:21 pm
He should have outsourced to India. No one would have looked twice.
Posted by: Scott on January 16th, 2013 at 9:29 pm
This is clearly a fake story.
It is logically inconsistent. We are told the person worked at his desk all day using social networks, etc. He was *present* at his job. They also say that he worked at this one company for “several years”. But then they also say he did this same scam at “multiple companies” and earned “several hundred thousand dollars a year.” How could he be working at multiple companies, while also at his desk most of the day at one company doing nothing much.
See:
“Evidence even suggested he had the same scam going across multiple companies in the area. All told, it looked like he earned several hundred thousand dollars a year, and only had to pay the Chinese consulting firm about fifty grand annually. The best part? Investigators had the opportunity to read through his performance reviews while working alongside HR. For the last several years in a row he received excellent remarks. His code was clean, well written, and submitted in a timely fashion. Quarter after quarter, his performance review noted him as the best developer in the building.”
Still it is a fun story, and probably has some prescience.
Posted by: Lawrence Sinclair on January 16th, 2013 at 9:54 pm
You can also……. ha ha ha
Posted by: Bob on January 16th, 2013 at 11:53 pm
This story sets off a lot of BS alarms. Seems likely to be at least embellished, if not downright bogus. The “typical work day” stuff sounds particularly fishy.
Posted by: Skeptical on January 17th, 2013 at 12:20 am
Rocky,
Given that the company in question does “critical U.S. infrastructure work”, they couldn’t outsource this themselves.
Posted by: Cybrludite on January 17th, 2013 at 1:15 am
Great approach. Cost savings. Innovation. Wonder if he got a promotion!
Posted by: David on January 17th, 2013 at 2:04 am
Was did his employment contract say? What did the employee say? And obviously the issue wouldn’t have been uncovered if he had actively pulled the results instead of letting the contractors connect to the company VPN.
I do this all the time, reverse-proxying ssh connections to my box camouflaged as a radio stream. Just kidding.
Posted by: hruba on January 17th, 2013 at 2:31 am
Please let me know the company name in china.
Posted by: ikjoon on January 17th, 2013 at 2:34 am
Had he called himself ‘Bob Inc.’ instead of just Bob this would have been the way to do business, maybe he would be employer of the year instead of just best developer. But don’t you dare make money for yourself by abusing of outsourcing mechanism. Unless you are CEO that is.
Posted by: Likeaboss on January 17th, 2013 at 2:55 am
that guy is a real entrepreneur! Economies nowadays can use this sort of persons.
Posted by: fred on January 17th, 2013 at 3:35 am
I personally think this as a fiction as I don’t believe such unethical software engineer exists in America.
Posted by: Shaohong on January 17th, 2013 at 4:26 am
1, Arrive and surf Reddit for a couple of hours. Watch cat videos
2, Take lunch
3, Ebay time.
4, ish p.m Facebook updates – LinkedIn
5, End of day update e-mail to management.
6, Go home
7, ………
8, profit
Posted by: henrik on January 17th, 2013 at 4:30 am
Why for God sake they analyzed PC, files, network topology, segmentation, etc. and did not simply ask him to show his RSA token ?!? I guess they were paid per hour rate ?
Posted by: Ali on January 17th, 2013 at 4:30 am
The story adds a new dimension tho term “Chinese Farmer Gold”
Posted by: A. H. Andersen on January 17th, 2013 at 4:53 am
Dear All
It is clear that artificial barriers can not supercede the natural principles of economics. If the same job could be carried out at 1/3 or 1/4 of the costs in India, there is no way it can be prevented. If companies creates barriers individuals will start doing the same. They will pay 1/4 of their CTC and get some one to logged and do the job. In these days of Mobility and cloud amd social media connections, there is no way companies and countries can control the demographics in Buy side or in sell side. Interconnected world will have different rule of the games.
Posted by: Dheeraj on January 17th, 2013 at 6:06 am
@Rich – It’s always been this way. There is one law for the common man and another law for the monied (corporate) class.
Posted by: p-dawg on January 17th, 2013 at 6:18 am
I really don’t see the big deal. My manager does this outsourcing to me all the time. I would challenge the greedy fatcats to take a bonus cut worth half of what bob makes. They would change their minds immediately.
Posted by: poor working stiff on January 17th, 2013 at 6:31 am
Come on folks, why did you removed my comments about questioning the truth of this hoax?
Anybody believe this is truth need to question the level of idiotness of Bob’s manager and his fellow colleagues. No real software engineer in US will believe in this fiction.
Posted by: Shaohong on January 17th, 2013 at 7:04 am
It would have been even more profitable if he would have done something creative(worthy of earning him something) instead of watching cat videos.. That guys, is the real productivity.. I would have awarded him a medal if he would have done that! Work like this for 5-10 years and then retire to a peaceful life
Posted by: Rhishi on January 17th, 2013 at 7:25 am
To everyone saying he’s a hero and deserves a raise….. I get your point. But there is one important point you all seem to be overlooking:
“They’re a U.S. critical infrastructure company, and it was an unauthorized VPN connection from CHINA. The implications were severe and could not be overstated.”
This almost certainly means that they are privy to United States classified information, and providing VPN access into the network is STEP #1 in the guide to “Making it easy for other nations to subvert the US”.
Posted by: Mike on January 17th, 2013 at 8:05 am
Admit it, you lifted it from this didn’t you?
http://www.theonion.com/video/more-amer ... sea,14329/
I call fake
Posted by: Johnny on January 17th, 2013 at 9:57 am
The reason the Chinese guy could do the work at a quarter the cost might be because he was selling the secrets he obtained on the side!
Posted by: Philbert on January 17th, 2013 at 12:46 pm
We got a modern Ferris Bueller here! Bob for President!
Posted by: RollTide2013 on January 17th, 2013 at 1:24 pm
@Johnny, Good job! I feel the same as you. This story only look real to the people who never worked as a professional software engineer in a real American software company.
My personal experience have told me American software engineers are working just as hard as their Chinese counterpart.
Besides it’s impossible for any software engineer making “several hundred thousand dollars a year” can sit idle in his office day by day. That’s not the way to develop software. It’s simply not real!
Posted by: Shaohong on January 17th, 2013 at 1:32 pm
I think this guy has a brilliant future waiting for him as an elected politician.
Posted by: Reggie on January 17th, 2013 at 3:10 pm
This is outrageous!
Posted by: tech blog on January 17th, 2013 at 3:27 pm
This story reads like it was written by Stephen Glass. I just don’t buy it.
Posted by: Kelly on January 17th, 2013 at 5:01 pm
yep – I call either journalist looking for ‘how far will my story travel’ urban myth status, or promotional piece for the proponents of outsourcing to China.
When I was in Malaysia, there was a news story about a government sponsored prize competition for local programmers for who could write the best simple program to do something in 1 day – many applied – guess what – NOBODY passed – NOBODY managed to write a working program – there’s your quality standard.
Posted by: Frank on January 17th, 2013 at 5:24 pm
I fail to see the problem unless the company has a rule that an employee cannot outsource their own job. Yes, it was infrastructure however, during the entire time this was going on, no damage was done. The employee used his own wages, sorry but this is something that business owners do every single day and because an employee does it this is now wrong?? How many company execs do nothing during their day and make huge figures while their employees do all the work and make less??? Not wrong for an employee to do what companies do every single day and there is no law against it unless his contract specifically states he cannot outsource his job.
Posted by: Raquel Santiago on January 17th, 2013 at 5:36 pm
Please excuse me if I withhold lending credence to this story. First “Bob” is a trusted, relatively well known employee who apparently spends his time on-site in the IT factory grinding out code day-in and day-out. But really from his cubicle he does Reddit, LOLCats and what not. All the while he sends in daily reports of his accomplices’ accomplishments. Of course nobody notices any change in his work product despite it apparently drawing attention to be award winning for its simple elegance.Then we are told “evidence seemed to suggest” he had the scam going at multiple companies in the area. Apparently this guy also can outsource his physical presence. Now that is impressive.
Perhaps this story is a composite of some group that did these things, or it is a hoax. But I am not buying into the story as presented.
Posted by: RJD on January 17th, 2013 at 6:37 pm
I am not surprised by this or the comments. It is why Asian students proudly claim that they are the next super power and America is dying. You should all be so proud to be American…that is sarcasm for the Americans.
Posted by: Jack on January 17th, 2013 at 6:59 pm
Bob sounds like he originated in the movie Office Space. He’s got upper-management written all over him. An innovator, even. Just think of all the money he SAVED the company by outsourcing. Geesh.
Posted by: OPD on January 17th, 2013 at 7:07 pm
Indian workers in us do this all time
Physically in the US recieving code from bangalor via IM cut and paste!
Ask the real quiet reserved indian code jockey at your company to walkthrough his/her code with other american programmers
Posted by: Bob on January 17th, 2013 at 7:50 pm
Funny, when US corporates do this its good business – when ‘Bob’ does it – it’s a security issue. Lol.
Posted by: Ben on January 17th, 2013 at 11:13 pm
Boy that’s just a straight shooter with upper management written all over him!
Posted by: The Bobs on January 18th, 2013 at 12:04 am
I have bought software with source code from Dalian, China before. The price I paid was one fourth what I would have paid for in the U.S..
Posted by: Jacky on January 18th, 2013 at 2:44 am
What kind of a manager would give mid-40 software development professional the performance review comments as “His code was clean, well written, and submitted in a timely fashion”? It’s like telling teenagers they can walk well. It’s almost like an insult.
And the tricky thing here is that the author can refuse to reveal any truth bearing details for “security” reasons. So the story could continue on and on. It reminds me story in which one guy said he was kidnapped and raped by aliens, multiple times! Who can verify this didn’t happen?
Posted by: Shaohong on January 18th, 2013 at 3:00 am
I praise this guy! Why? Because I do something similar! I come to work spend hours on Stack Exchange, Ebay and other garbage. Get bored out of my mind and guess what. My bosses love me! Plus I get paid 3 times the annual average (UK), health benefits loads of holidays and company car. How do i get this right? Simple. I do my job properly! And then I make sure not to hand in sh*t work. Near perfection is my objective. I get it done right the first time round. Get it? Apparently not! When I do work I put 200% in. It generatats income for my company from start and it makes my collegues life easier! Frankly, I think they know I do other work , while I am at work. So I get paid to work. Plus freelance money I do at work. LOL- The rest of you people who diss Bob are Looosesers. Can you say big fat “L” ! Bob is my Idol! The only mistake he made was using VPN instead of SSH tunneling via an internal proxy. Ooops.
Posted by: ppumkin on January 18th, 2013 at 4:26 am
@fredo
You’re the one of the few commentators that are able to think and identify this as a potential hoax. Unfortunately very few percentage of the population are able to do it. People are so prejudicious / superstitious these days.
Posted by: Shaohong on January 18th, 2013 at 6:08 am
May be very interested to get in touch with those excellent coders, as now they have lost a client Seriously !
Posted by: Celeriz on January 18th, 2013 at 7:26 am
Wow.
What’s the real story here? That ‘Bob’ outsourced his work life; whether or not this story is real; or the reckless perspective of so many of the posters to this article?
I say it’s the latter: the reckless and unprofessional perspective tendered by a good many of the posters to this article. The narrow, improperly focused, oblivious, irresponsible, folk-hero-worshipping perspective aired here.
Corporate execs are legally culpable (like it or not) for what goes on within the confines of their org. So if Bob purposely and overtly exposes that org to THE bad actor nation in the world at this time, that’s a bit of a problem. I hope Bob is ready for retirement, ‘cuz when it gets around the C suites that Bob has been threatening the CXX’s way of life for some time now, he may have to see if he can get a job doing maintenance on T-shirt websites.
SDLC anyone?
Posted by: jobewan on January 18th, 2013 at 7:40 am
The guy divulged his user credentials. Who knows what kind of access he had to the network.
Posted by: blutoh on January 18th, 2013 at 7:58 am
“he had the same scam going across multiple companies in the area.”
Scam??? What scam? Isn’t this exactly what management wants to do? The only reason it’s being called a “scam” is that the employee put the outsourcing bonus in his pocket, instead of in management’s.
Why are only management allowed to outsource jobs? If the people doing actual jobs get somebody else to do their work, they are scammers. If management does exactly the same thing, and lays off the employees, they get a bonus.
Posted by: Marc on January 18th, 2013 at 8:41 am
I was in a Verizon security briefing and they used this story. A few things left out where he was physically working in the office yet they saw an active VPN connection using the token from China. Plus I think that company plus the others sued him so I doubt he did so well after.
This happened at least a year ago so this is an old story just it never hit the internet till now.
Posted by: Brett on January 18th, 2013 at 8:44 am
100% lie. For such programming job people get around $100K, not “several hundred thousands”.
Also, to manage and communicate with outsourcing team one needs to spent considerable time and effort. This is a project manager position, which is harder than just to develop code. Finally comes obvious discrepancy in the story. First they said the guy worked 9-5 in the office of his employer company. Second they said that he conducted “the same scum in several companies in the area”. How could he be 9-5 in several places???
This is written by outsourcing advocates to show how stupid and lazy Americans are and how smart are people in China. I know personally how far this is from truth. I was a project manager in USA company managing outsourcing team. It was extremely difficult to get job done ontime with quality.
Posted by: Alex on January 18th, 2013 at 10:20 am
I drew a comic inspired by this guy’s story. Check it!
http://pcweenies.com/2013/01/18/a-bob-b ... ther-name/
Posted by: Krishna Sadasivam on January 18th, 2013 at 10:52 am
Bob is ready to be a CIO!
Ship em ship em ship em ship em ship em overseas.
Posted by: Congrats on January 18th, 2013 at 12:26 pm
Bob has simply elevated himself to project manager.
Posted by: Business guy on January 18th, 2013 at 12:37 pm
Leave a Comment
Name
Mail (will not be published)
Website
All submissions, like other use of this site, are subject to the Terms of Use. By using the site, I agree to those terms.
CAPTCHA Code *
- Mensagens: 4581
- Registado: 14/3/2009 0:19
- Localização: 16
6 mensagens
|Página 1 de 1
Quem está ligado:
Utilizadores a ver este Fórum: Akinfiev, Carrancho_, castrojjf, Google [Bot], Google Adsense [Bot], m-m, malakas, MR32, niceboy, nunorpsilva, OCTAMA, PAULOJOAO, peterteam2, Pmart 1, Shimazaki_2, trilhos2006 e 267 visitantes