Can coronavirus COVID-19 impact your network? The short answer is “yes”, if your firm hastily adopts a remote work policy without considering some common sense security precautions.
1. No personal email. The only exception for this would be to contact helpdesk about being unable to accesscorporate email. Personal email is not typically set up to properly archive and retain messages that could later be subject to a legal hold. The very use of personal email for business purposes can potentially expose your firm to liability costs that would exceed the value of whatever business you planned to get done.
2. No personal file sharing. This is right up there with personal email. Personal anything is not allowed for business use, mmmkay?
3. No Remote Desktop Protocol (RDP) use over unsecured Internet. If I had a nickel for every person that told the network team to open up port 3389 on the firewall so that they could work from home, I’d be comfortably well off. Yes, RDP means you can access your desktop or server from home. It also opens up great work from home capabilities for attackers. They will guess your username and password. It’s only a matter of brute force time.
4. No low-security options on the VPN configuration. While I’ll allow you to use RDP through a VPN connection, I’ll only allow it if your VPN is not just secure, not just really secure, but only if it is really really secure. That means not just IKEv2 and the best AES that your system will support, but also secured authentication that uses more than a username/password combo. Let there be a certificate or software token as part of 2-factor authentication.
5. No split tunnels. It’s tempting to let a local ISP handle all the Facebook and YouTubetraffic that users consume in between productivity spurts, but don’t. Either pass all that traffic through your own network, or block it with a message that VPN bandwidth is limited due to whatever reason you want to provide in order to justify blocking that traffic. My point being that a split tunnel approach allows for an attacker on the Internet to bridge their attack through your user’s PC.
Can there be more possible pitfalls? Sure. These are just the five biggest ones. If your firm is anticipating a stretch where a large percentage of employees must work remotely, then take the time to bake some security into that plan so that reducing healthrisk doesn’t increase IT risk.
On 12 December 2019, Chinese broadcaster CCTV announced that a new viral outbreak had started in the city of Wuhan. While the first confirmed case was on 17 November, it was not until more cases came to the attention of authorities – in a way that they could not ignore – that the Chinese government began to publicly acknowledge something new was underway. Following that 12 December announcement, the world began to transform. As output ground to a halt in much of China, factories depending on Chinese raw and intermediate goods had to slow or stop production. The lesson learned was both sharp and timely – “just in time” methods of production left firms vulnerable to disruptions in the supply chain. If firms kept a reserve of parts, those could have lasted through at least some of the lapse, if not all of it, and would have allowed for less economic dislocation.
Part of the “just in time” mentality of go, go, go all the time is the ideal of “five nines” or even “six nines” – 99.999% or more uptime for all systems. While, yes, this does mean the product always moves out the door, it also means that the things making those products go unpatched and unprotected for long stretches of time, making them prime targets for attackers. Those vulnerabilities leave the firm just one click on an email attachment away from utter ruin.
Just as there’s an argument to be made for adding some storage capacity to help weather supply chain shocks, we need to talk about “two nines” uptime as a way to avoid eventual “infinite zeroes” uptime conditions. If you give me 100 minutes each week, I can get a breathing space to apply needed patches on production servers and equipment. If I don’t need a week’s 100 minutes, let it roll up into next week – maybe I’ll need more time to apply the next patch, who knows? But let me have a reserve of time during the working year so I can do my job to patch and protect. Let me reboot gear that needs its queues cleared, let me stop and restart services on servers, let me keep things up to date so we can spend the other 99% of the time feeling more confident about the resiliency of the environment… just in case, ok?
I’m aware that executives in most nations have a fiduciary duty to maximize shareholder value. That’s a short term goal that is itself replete with abuses when it considers employees as expenses as opposed to capital or when it looks at wages as a race to the bottom. I’ll leave those criticisms of neoliberalism for another paper at another time. But here is where I criticize those fiduciary duties as regards security. Maximizing shareholder value means minimizing expenses in the short run, and security is seen as an expense, not as an investment. Current accounting structures blind the books to an ability to properly assess the value of a security system in its ability to provide long-term stability and constancy. I would love it if share prices for a firm jumped every time it announced it was undertaking a security project. Sadly, they’re more likely to drop as those expenditures for security are seen as short-term profits lost, not long-term profits gained.
In the meantime, I’m reading headlines about increases in ransomware and other attacks using email attachments with references to coronavirus, COVID-19, and even SARS-CoV-2 to successfully penetrate those PCs bridging traffic between the raw Internet and the corporateVPN, because it was cheaper to use a split-tunnel solution than to backhaul all the Internet traffic through the corporate networks – and also because it was seen as “nicer” than banning non-business related Internet usage for devices on the VPN. I know I’m getting into just one of the technical weedpatches of issues, there are others… and if firms could see their way towards working more for the long haul than the short-term gain, we’d likely have the right solutions instead of the cheapest and easiest, which are never the strongest.
I work for a security vendor and I see into many customer environments. Often, the thought pops in my head, “If I were an attacker, I’d really get them if I [REDACTED].” And if I don’t think I can get them with [REDACTED], then [REDACTED], [REDACTED], [REDACTED], and [REDACTED] round out my top five most common ways to break into an organization and have access to quite a lot that I shouldn’t have access to.
It’s not that these methods necessarily have something to do with the product I support. Some do, like [REDACTED], [REDACTED], and [REDACTED]. But [REDACTED] and [REDACTED]? Well, that’s some other vendor that helps out with those weaknesses.
Now, as you read those paragraphs, what thoughts do you have that fill in the blanks I left? Unless you’re someone that works in the same line of security that I do, I’d dare say your top five exploits list is different from mine, in part or in whole. What’s more is that we may even have some of the same customers, and we may, between all the people that work in security at that customer or on behalf of that customer, we may actually know dozens of things that fill in those tantalizing [REDACTED] blanks.
Now, I know that the customer might want to know all the details of everything I notice, but I’m often noticing things that are out of the hands of the people I’m directly working with. They can only report up to their manager, and that communication only goes so far before it drops in urgency and loses its audience. Or, worse, it’s just added to the list of security things to fix, right behind [REDACTED], which got noticed last week in an audit finding.
So, let’s ask the question: what are the things that are the hardest to fix that leave organizations the most vulnerable? There are a number of “10 Quick Security Fixes” articles out there. Everyone knows how to pick low-hanging fruit. What I want to ask about are the projects that nobody wants, the projects that get people fired, the projects that land everyone in the [EXPLETIVE DELETED]. Because these are the ones that don’t get done, get done but badly, or get done only to such a point as a box on a checklist can be ticked, and then no more. For example, nearly everywhere I’ve been to has firewalls set up. That’s good. But when we talk about turning the firewallconcept inside, to regulate traffic in a segmentationproject, then I know I’m going to have an uphill fight in getting information about which apps use which ports.
Why will I have that uphill fight? Because I have to ask for netflow, that’s why. And then we need to talk to different teams about when they run their apps so that we’re sure to not block anything that runs only once per year. And then we have to deal with how Microsoft recommends that we leave open ALL. THE. PORTS.So that’s just one type of project that is practically a mission impossible.
What projects do you face that are nearly impossible, but fill in those [REDACTED] blanks?
I promise the dear reader that this will not be just a rant about how nobody takes security seriously or anything in that vein. Read on, and I’ll get to the actionable items. I just need to set some things up in order to give credence to my conclusions.
Some years ago, the Polish science fiction author Stanislaw Lem wrote an essay about weapons development titled “The Upside-Down Evolution”. In it, Lem called out several interesting trends: miniaturization, dehumanization, and deformalization. The key trend gave the essay its title: rather than developing smarter and smarter AI, the true breakthrough Lem foresaw was not in artificial intelligence, but in artificial instinct. Lem postulated that a weapon need not be coded to handle all types of situations. It only needed to be able to perform a certain range of tasks under certain conditions, nothing more.
Combined with miniaturization and dehumanization, limited weapons systems – artificial insects, in Lem’s parlance – also allowed for the deformalization of war. No more a matter of exchanged ultimatums and formal declarations, war in Lem’s future would be constant and acts of aggression difficult to attribute. Consider a swarm of artificial insects each carrying a fractional amount of fissile material that converge on a location to create a critical mass for a nuclear explosion. If all the artificial insects are destroyed in the explosion, who could say what actor or actors was behind the event? Could it be an attack by a foreign power or a false flag attack used to justify an attack on another foreign power? Or could it be done to frame a third party?
Once deformalized like that, warfare would be constant. Natural disasters could be no more than just that, or they could be the products of an attack by a hostile party. There would be no way to tell the difference.
While we are yet to see Lem’s artificial insects on a grand scale, we *do* see the next closest thing – cyberattacks.
Cyberattacks check all the boxes of the upside-down evolution. They are mere digital streams of signals – miniaturized. They are often products of algorithms – dehumanized. They are always out there, always attacking in the ways they are set up to attack – deformalized. And they only do that *one* set of operations that they have to do – artificial instinct.
Lem’s essay did not go into matters of defense except to say that the need for uniforms, marching, parade drills, and generals all went by the wayside. At best, those were worthless vestiges of another age. At worst, they hindered responses that had to be just as rapid and ruthless as the attacks. Lem only considered nation-states, but we now live in an age with a myriad of players having access to these attacks – and a myriad of defenders still trying to fight the last war.
Old-timers will remember Clifford Stoll’s epic, The Cuckoo’s Egg. The story is of a humantracking and trapping another human. At the time, the FBI was uninterested in the case, as no large sum of money was involved (less than $1) and no classified files were accessed by the attacker. While we may look back on that and shake our heads the way modern combat veterans would react to how various World War One generals dismissed the power of the machine-gun, that was the FBI still fighting the last war.
Well, Stoll went on to write in 1995 that the Internet was just a fad and would never catch on as a platform for commerce and information exchange. Yes, he still kicks himself over that article, but at least he’s aware of the irony and how outdated that thinking was. And though I talk of a mindset fighting the last war, that was the 1986 mindset. People today may have moved beyond that, but not much. Most are still expecting a Stoll-like boffin to do the investigative work to catch the baddies and bring them to justice. That’s because the events described in The Cuckoo’s Egg are those of a previous war.
To be perfectly honest, most firms aren’t even thinking about fighting a war. They’re not built to do so. At no point is there an MBA class on Sun Tzu’s Art of War that ever tells the students, “You know, this really isn’t allegorical when it comes to IT.” I know this because I have yet to work with a customer in the business world that doesn’t underline the principle that security won’t interrupt business as usual.
I’m sorry, but that’s quite the paradox, Mr. Customer. Do you want business as usual without security, or do you want to change how you do business in order to have security? Are you still forming soldiers into phalanxes of spearmen for operations on an open field of battle, or do you plan to tell them about the need to disperse and entrench so as to avoid being overwhelmed by large-area effect weapons? If still the masses of spearmen, I have a rude surprise waiting for them when the drone with a fuel-air explosive arrives on the scene…
… and even that analogy is out of date, as the actual attacks coming at us every day are not even needing drones in order to do their damage. Worse, because we put emphasis on doing business first, we’re only looking at security as a bolt-on. That means the underlying systems will always be more vulnerable that necessary.
So what keeps this article from being another mass of groanings about how things are? What are my fixes, my takeaways that businesses can put into place? All right, all right, I’m ready to get to my point.
You’ve got to apply upside-down evolution to your systems. Doing so will give them higher immunity and better resiliency against attacks. It will mean more interruptions to business, but of less total time than what would happen to your business if there was a successful denial of service attack against it. Moreover, the interruptions will be localized, not general.
Automate your responses to any breach of standards, and make those responses harsh. Do not exempt anything. I grant that the last sentence is more a starting negotiation position than a final state, but I stand by it, all the same. When the endpoint or server or application goes wrong, shut it down immediately and get it fixed just as fast. Then, when it comes back online, it is fresh and ready to defend itself.
And if your shutdown actually caught an attacker, so much the better. The swift action meant limited damage. Do you know how Taiwan had such a low infection rate in the recent pandemic? It shut down ALL travel to the island. Nations that made exceptions got hit hard. Taiwan made no exceptions, and that swiftness and harshness saved lives.
What is your return on investment? Your business stays open, allowing you to continue to get returns on all your other investments, that’s the ROI. The coming years will see attacks that are more miniaturized, more dehumanized, more deformalized, and more artificially instinctful. Trying to stay open 24/7 in that world will be like leading those spearmen in a charge against a tactical nuclear warhead. Automate, be strict, and accept small downtimes now instead of permanent downtimes later. Fight the current, upside-down evolution-born war, not the one where we trace a 1200 baud modem connection back to Bremen after months of investigation.
Here is an interesting article on voter caging. “Voter caging” is a term that refers to targeted efforts to suppress or intimidate selected groups of voters. This goes back to 1958… and, sadly, these efforts were directed against minority or Democrat-leaning constituencies by Republican state legislatures. These voter caging efforts would be accompanied by media campaigns alleging massive voter fraud when, in fact, the only evidence was a piece of non-forwardable mail to an old address. The person that would become the target of a voter caging effort may have had already moved and re-registered with the new address, but subtleties like that don’t make for good marketing. The article itself covers voter caging up to 2004, but it remains a practice that the RNC makes part of the Republican national political strategy. And let’s be clear: these anti-fraud campaigns target minorities and Democrat-leaning constituencies, not Republican ones. The efforts to disenfranchise minority voters are strengthened when Republicans in Congress vote to dismiss US Attorneys who refuse to pursue weak voter fraud cases brought to them by Republican Party operatives.
An excerpt:
Kentucky 2004
The Jefferson County, Kentucky Republican Party gave an early warning in the summer before the 2004 federal election that it planned a mass challenge program. The GOP announced in July that it would place Republican vote challengers in predominantly African American precincts during the November elections, just as they had done the previous year (in 2003, Jefferson CountyRepublicans placed challengers at 18 polling places in predominantly black districts). The party went too far for some of its members. In August 2004, about a dozen Republicans gathered outside the Jefferson County Board of Elections to call for the resignation of the JeffersonCounty Republican Chairman, Jack Richardson. About half of the protesting Republicans were African American. An African American Republican candidate objected to the challengers, sayingthey would keep some of his supporters from the polls. An African American Republican poll worker who had worked the polls for 13 years was angry that she had been replaced in the last election by a white Republican who did not live in the precinct.She reported that she visited several precincts to see who was working the polls and was surprised to find that virtually all of the locations were manned by white Republican poll workers. http://www.projectvote.org/wp-content/uploads/2015/06/Caging_Democracy_Report.pdf
I just got my copy of “How Trump Stole 2020” (link below) and I’ve just finished the first chapter outlining how Kemp stole the 2018 Georgia election. It was simple, in that he started early. As Secretary of State in 2014, he refused to add minority voter registrations. When registration activists showed him copies of the registrations and demanded to know why they had not been added, he charged them with criminal tampering of voter forms – because they had made copies! He was sent over 86K voter registrations from a drive in 2018 and he refused to enter about 40,000 of them.
Simple math that adds up to a stark truth: in Georgia, where there aren’t enough white voters to put a Republican in office in a fair election, the Republicans in office refuse to register nonwhite voters. Because that is a policy that maintains the power of one racial group over another, that is the definition of racism. One who supports such a party is supporting a party that advances racism.
But wait, there’s more: Kemp also purged the records of over 660,000 nonwhite voters in advance of the 2018 election, including people who had voted in every election at the same polling place since they won the right to vote in 1965.
Now, in that purge, yes, there were 64,446 voters who had died, 14,021 imprisoned for felonies (another Jim Crow racist policy, but we’ll pass over that), but that doesn’t account for the other 534,510 who were purged for the reason of “System Cancels”.
They had not voted in two previous elections and did not respond to a postcard allegedly mailed to their registration address. Kemp claimed they had all moved: but there was zero demographic or U-Haul or any other information to back that claim up.
In some cases, the “move” was simply going from one room in a retirement center to another – they got purged. Others never moved at all – too bad, they’re black or Hispanic or some other group that Kemp couldn’t count on as a solid white Republican voter, so they also got purged.
Military personnel who had moved from overseas deployments back home to Georgia – purged.
This is disgusting, and this is only the first part of the book! I know that there are many other cases, as the Republican Party makes no secret of its hostility towards blacks, Hispanics, and other nonwhites and their votes. It is revolting how closely tied the Republicans are to white supremacism – it is either used directly as a tool or, worse, people who should be outraged and vocal about it choose instead to let it slide and be quiet accomplices in active racial discrimination.
Now I’m in the next chapter, where the author, Greg Palast, discusses the experience of going through Kemp’s purge list – which Kemp refused to give to Palast but was happy to hand over to someone posing as a Fox News editor – with a direct marketing database. Rather, 240 separate databases used by direct marketing firms to keep their address lists up to date.
340,134 Georgians who had been purged for moving were still at their home address, alive, well, unconvicted of a felony, still US citizens. The full summary of the analysis is in the appendix…
This is why I left the Republican Party, and it has only gotten worse under Trump. This Georgia story is not alone, and I am going to read about how Republicans in other states used nakedly racist targeting of voters to steal elections. Remember that Kemp only won by a few hundred votes, and you see why it was so important for him to purge hundreds of thousands of legitimate voters and to refuse to register tens of thousands of other legitimate voters.
Get out of that party before it destroys your soul any further, if you have a soul that you plan to use later on. I’m already disgusted by John Cornyn’s nakedly racist attacks on Royce West, and those ran even before the runoff vote was settled between West and Hegar! Sorry, no. If you support Republicans, you support racism, plain and simple. If you don’t support racism, then you can’t support Republicans. None of them, not a one. They are either actively racist or silent cowards that cannot stand up to evil.
I’ve been back in IT for 7 years now, after over 10 years teaching high school. With 14 years of IT experience and 16 in teaching, I can tell you all something that you’re not going to like, but you need to hear it. A lot of people that learned how to lie their way through high school have figured out how to lie their way through a career, and they may very well be working for you, over you, or as a peer. I can spot them when I see them, but an untrained eye and ear is almost always baffled by the BS these people know how to put up to screen their incompetence.
I’ve seen some people with below-average skills muddle through in various areas of IT. As long as they can stay in their lane, they do well enough to justify getting paid to do their work and there doesn’t have to be much worry about damage that they can cause. But when the work moves to security, things get very complicated and multidisciplinary very quickly, and those people with below-average skills find themselves in a stressful situation.
When we put people into stressful situations where their knowledge and expertise play an important role in getting a successful outcome, we want people to be honest with us and to let us know when they need more help and guidance. Often, employers want to see their best employees get better. Frequently, we make mistakes that we have to learn from – but the learning is a good thing, and a positive in career development.
But what about people who don’t learn from their mistakes? What about people who aren’t honest about their shortcomings? They know they’re in over their heads and that they have to use survival strategies to keep from getting fired. What are their typical go-to behaviors that keep them employed, no matter what damage they may do?
1. Control Information Flows This is a major survival strategy, one of the best. If all information passes through the employee, that employee can control what form it takes when it gets passed along. Did a vendor explain a complicated solution that they can’t understand? Tell the manager that the vendor has no clue what’s really going on. Does the manager want to speak directly to the vendor? Poison the well by saying things like “good luck, I can never reach the guy, and when I do, he just blows smoke…”
I’ve worked with people who somehow seemed to never get along with other teams, ever. They were impossible to work with, they didn’t know their jobs, they didn’t do their jobs, they were complete train wrecks. Could I talk directly to those other teams? Well, wouldn’t you know that when the people who never got along with those teams tried to send invites, they never got a response? Wow, what dumb luck, that. I guess these guys are tough to work with…
… except they’re not. Seriously, I’ve seen this before when kids never got notes back to their parents or the parents didn’t seem to care about the notes. So I called the parents directly to work things out. Suddenly, I’m talking to people who care and who had no clue how their kid was forging signatures on report cards for years. They think he’s got good grades because he’s also been forging the report cards! Truly, it’s amazing what modern color printers can do these days…
But, yeah, when I was told that the other teams were impossible to work with, I didn’t waste time arguing. I said that that was just unacceptable and got hold of a manager to let him know that we couldn’t get our project going without help from the other teams. When the manager set up meetings, it was like day after night. I found the other teams were a delight to work with and a fount of valuable information. And that the guy who threw them under a bus was himself unable to keep up with the discussions we were having, even on a basic level. Once the information flow control is broken, it’s much harder to stay incompetent.
2. Escalate Emotions Not really bullying all the time, although bullying would fall into this category. Emotional escalation goes like this: you’re about to be shown up as a fraud by a line of discussion, so you start to make things personal. You get mad. You come out and demand to know if the other party in the discussion is casting aspersions on you. Are you being insulted? Are you being called an idiot? A liar?
Kids do this all the time, with the benefit of an often-sympathetic classroom audience. But this stuff works just as well in one-on-one situations.
Most people back away and never bring that up again, as it’s embarrassing. The next most common response is a corresponding escalation, verbal battle, and then having to apologize for having said things you later regret. Maybe the person who starts the escalation can get a response so toxic and nuclear that it’s the competent responder that gets let go and not the incompetent instigator.
If you back down, you lose power and respect in the relationship. If you escalate, you lose possibly your job. To win, you have to take a different path, the one teachers are taught to take: abide.
To abide means to follow the rules, but to remain unchanged, to endure. Remember that “follow the rules” means following the rules of the company, not this guy’s personal bending of the rules for his survival. Companies have rules on civil conduct. It’s very easy to say, “There’s no need to raise your voice. If I’m doing anything wrong, let’s take it up with HR/our manager/some other authority.” That usually prompts consolation, apologies, and other rapid de-escalations so that it does not go up the chain of authority to someone who might issue a reprimand for the escalation.
If you accept the de-escalation at face value, be prepared to be blindsided by this guy controlling the flow of information and getting you fired before you get him fired.
If this happens in a meeting that got recorded, get a recording of the meeting ASAP. If this happened in front of other people, get their witness statements ASAP and document your own recollection ASAP. If this was one-on-one, go to your HR/manager/some other authority ASAP before this guy gets to them and fires torpedoes into your career. When this guy raised his voice to you, he declared war. Machiavelli teaches us that war does not end until one or both parties are vanquished or no longer have the motive and capability to attack each other.
3. Odd Working Hours Why is so-and-so late or not coming in today? Does so-and-so claim to have been in a very early or very late meeting with a team that nobody else has any real contact with? If that’s the case, it’s time to develop some contacts to see if the meeting actually exists and if so-and-so does anything useful in it.
If a teacher falls for excuses like this, the kids will never show up to class and will skate by because their sob stories earned them makeup work exemptions without penalties and other goodies like that. You have to do a little digging, if you want to be sure of things…
If the meeting actually exists, well, you may not have much to go on except to watch out for the other behaviors. If the meeting doesn’t exist or he isn’t really needed in the meeting, then you’ve got evidence this guy is faking things. Not only does the meeting mean he basically gets paid to take a nap during that time, it also means less total time in front of people who can call him out on inaccuracies. Double bonus, there.
Long lunch hours because of bad service? Having to leave early to avoid traffic? Coming in late because of traffic? Missing meetings when remote because of a home emergency? If these excuses come up once in a great while, then they’re either genuine… or the person making them just needed a 2-hour vacation and maybe you just let that slide. But if these happen frequently, it’s a strong sign that the person making the excuses has every intention of reducing interaction so as not to be fired for incompetence, and he knows that most people are sympathetic enough to let even a habitual behavior like this go on, if it’s wrapped up in a good enough story.
I once worked with a guy who didn’t show up for work for 2 days. The manager called and was devastated when he got the reason: the guy’s wife had just been diagnosed with cancer and he was overwhelmed by it all. He got a few free days off of work, not charged against his PTO, and we bought him and his wife a nice bouquet. Now, this guy never was one for punctuality in all the time he worked there, and his lunches always seemed to go long. But, he also bought lunch for guys on the team frequently, so it was “our little secret”.
Another set of missed days came up and the manager called again. Again, he was devastated by the reason, as it was the same one from a few months ago: his wife had just gotten diagnosed with cancer. This time, the manager’s devastation was in realizing that he had been played for a fool. A quick call later to the wife revealed that she did not, in fact, have cancer. Nor had she ever had cancer. She had, however, kicked the husband out of the house because he was always turning up drunk after these multi-day benders and she’d had had enough of that garbage.
It shouldn’t have taken that second time through the excuse to notice that the excuses weren’t real, and that there’s a difference between letting something slide every now and then and letting those things slide all the time.
4. Look! A Distraction! So here’s the scene… we’re having a technical discussion or we’re in a working session… and this person starts with the small talk. Before long, nobody’s working on anything technical and we’re instead considering the truly weighty matters of the world that everyone has an opinion on but nobody can prove.
I knew when students were drawing me out to tell stories. To be honest, if we had the time, I’d tell the story. But I always held everyone accountable for their work, on schedule. It’s pretty much the same in business.
During lunch or dinner or in the elevator, this stuff is fine. If we’re all chatting in the five minutes before the main call starts, no problem. It’s team building or something like that. Building camaraderie or whatever. But if we’re on the clock, time is money, and we’re being paid to do the work we said we’d do.
Now, it’s one thing to have a discussion of sports, issues, the paranormal, and like topics as we wait for a power cycle or other time-consuming operation to complete. We may have already done all our email for the day, it’s 2AM on an overnight change cycle, and we know the patch takes 2 hours to download and apply. We are going to talk about non-work related stuff and that’s fine.
But when we’re in the middle of the business day and are doing non-trivial tasks, these distractions are attempts to steer things away from where they’re vulnerable – technical topics – and to areas where you are vulnerable. After all, if you spend time chattering away on the company dime, aren’t you as guilty as the distractor? Or maybe even more so, if he can claim he was only making small talk, but you’re the one who derailed the work session…
5. Activate the Blame-thrower! I’ve played enough FPS video games to know that the guy with the flamethrower is pretty much going to get us all killed. Either his fuel tank gets shot and explodes or, more likely, he opens fire from a position of cover (so as to avoid the fuel tank being shot) and then kills all the team members in front of him. A blame-thrower works on the same principle, but with the lethality transferred to the career rather than the person’s life.
I’ve also had plenty of students that, when brought before the principal, start to spew the wildest stories about one and all. That’s why I know how to deal with this behavior.
When something goes wrong, an honest person admits where one contributed to the failure. A dishonest person plays up the confessions of others and makes none of their own. If directly confronted, they will let the blame fly out towards everyone. If it’s groundless, the accusers will have spent time proving it so. If there’s a shred of truth, no matter how small, then, “See! I told you so! It’s not my fault!”
In teaching, the response had to be direct: “This is not about others. This is about what you did.” The same thing applies here. Don’t allow the person to use questions that start with “What about…?” in their defense. Don’t allow speculations or random accusations, either. Chances are that this guy’s got a personal file on everyone he works with, all stored in his mind, and when he’s pressured, he knows how to dangle details that put others in a bad light. The hope being that the questions coming at him stop because of other concerns or because the questioner fears that the next set of details will be personally directed. If someone says to a dishonest person using the blame-thrower tactic, “Let’s keep this all between just us”, the blame-thrower wins.
If you’re the victim of a blame-thrower, you have to fight fire with fire, I’m afraid. But your fight doesn’t start all at once. The ground must be prepared. When I was a teacher, I spoke with a principal about potential serious discipline issues as they manifested themselves to me. I spoke with other teachers and department chairs. When the eruption happened, nobody was surprised.
For your defense, as soon as you have a suspicion, talk about it with your manager. That way, when you have to defend yourself, it’s not a surprise to your manager. Your manager will have a situation in which an incompetent employee is wrongfully accusing a competent employee who has previously been concerned about said incompetence. The decision in that situation is much easier to make than one in which the accusations of incompetence suddenly emerge. Do you want your manager to respond to your defense with a question: “Why didn’t you tell me this sooner?” If not, tell your manager sooner.
Hopefully, the above descriptions set of some thoughts in your head about times you were dealing with someone covering up their own incompetence and help give you some tools for dealing with that so that you protect yourself and your career from the pitfalls these behaviors create.
Years ago, in the days of Jefferson, His father, surrounded by slaves, Taught the importance of self-sufficiency No slave dared utter a word about the irony, the paradox No slave dared utter a word about the dignity of all men Such was the Law Such was the Order
As the Nation was born And men celebrated their freedom from distant oppression Women dared not ask about oppression in their own homes Black men dared not ask about oppression in their own homes Jewish men dared not ask about oppression in their own homes Poor men dared not ask about oppression in their own homes Women and men, wanting different choices for themselves, choices of freedom Freedoms of the promise of the new Nation They wept in oppression in their own homes They took their own lives in desperation in their own homes Such was the Law Such was the Order
“Out West” offered new hope and new beginnings Except for the people already there, their lands now stolen Their nations driven further west, to barren lands The Cherokee tried so hard — Their clothes, their language, their slaves — All to prove their men were equal to men with power But they lost their land But they were driven West, far Out West Alongside others branded as savages Their skin was what made the difference Their skin made them worthy of beatings, worthy of murders Their skin made that which God had forbidden permissible Under the Law That preserved the Order Such was the Law Such was the Order
Swinging from the tree A body whose murderer Would face no Law Because of his place in the Order Such was the Law Such was the Order
A man and woman born free in Rochester Lived in fear of the slave catchers They could be made slaves in the land of the free Such was the Law Such was the Order
Weeping in her bed A woman whose rapist Would face no Law Because of his place in the Order Such was the Law Such was the Order
One drop of blood Made a man less of a man And a woman less than nothing Such was the Law Such was the Order
The war was fought to preserve the Nation The Laws were changed The Order was changed That the victory of the Nation preserv’d be not hollow But the war was not over And the losers of the battles Became the winners of the struggle political And they changed the Laws back And they changed the Order back And they made the victory of the Nation preserv’d hollow and empty And as they raised the statues and flew the flags Their boots walked on the backs of anyone they wanted to walk upon And that person could be killed for protesting Injustice And as they raised the statues and flew the flags They did celebrate that they needed not slaves anymore Such was the Law Such was the Order That they had created anew As they raped and killed And choked the throats They could not be convicted They could not be outvoted They could not be unseated They could not be moved Not even by Jesus’ teachings Such was the Law Such was the Order
Oh, and they weren’t done with Jesus, were they? He had not been crucified enough, they had to do it again “Inasmuch as ye have done it unto the least of these my children, ye have done it unto me” And so they beat Jesus, they raped Jesus, they called Jesus names of hate They took the vote from Jesus, they burned the home of Jesus, they tarred and feathered Jesus Oh, they dragged Jesus from their carts until he was dead Oh, they beat Jesus with rods until he was dead Oh, they hung Jesus from a tree in the dark of night Because they claimed with their lips to be Christian But their hearts were far removed from the Master They crucified Christ, and did so in the name of Christ Profaning and blaspheming, slaying innocents in the name of Jesus Christ Beating and raping and hanging Jesus Because they knew not what they did Such was the Law Such was the Order
And the people so desperate for work They would work for wages less than slaves’ They were paid so, Capitalism putting the nails in the coffins of chattel slaves Creating graves for the wage slaves Creating graves for the debt slaves Such was the Law Such was the Order
I can show you where it is cheaper For a certain firm To pollute and poison the waters of a poor village And pay a daily fine Than to suffer the people to drink pure, clean water Such is the Law Such is the Order
I can show you where it is better for business For a certain firm To make a slave of a prisoner Such is the Law Such is the Order
I can show you where a man can rape a woman or another man And the world knows of it And yet that man holds great power and authority And his supporters will claim to follow Jesus Christ Even though their leaders rape Jesus Christ Such is the Law Such is the Order
And let those oppressed by the Law And let those oppressed by the Order Let them speak up Let them sing their songs of hopeful freedom Let them look up to Jesus Christ to deliver them Let them walk together in their numbers Jesus Christ in the midst of them And those who oppress will line up the police And those who oppress will line up the soldiers And those who were oppressed are oppressed again As the batons rain down on Jesus’ crown of thorns As Jesus Christ gags on poison gas As Jesus is driven from his house And a rapist walks on broken glass to that house That he might look the part his followers expect of him Demanding the Law and the Order of generations To fall upon the heads of those oppressed by it Such is the Law Such is the Order
The Law is unjust The Order is unjust Is it just to demand Law and Order? Is it right that we continue to oppress by demanding Law and Order?
That person, bleeding on the sidewalk That person is Jesus Christ
That person, choking on poison gas That person is Jesus Christ
That person, crying out for justice Crying out for a Law that is just Crying out for an Order that is just That person is not asking for the Law and Order of the day That person is Jesus Christ
As God watches us with unbearable compassion He weeps for his children that have made unjust Laws He weeps for his children that perpetuate unjust Order For they are lost to Him Their souls make deliberate steps toward perdition Those who die under oppression, without justice They die unto God Those who die thinking the oppression was just They are told to depart from Him, for they never knew Him Even though that was Him Who they strung up on that tree Even though that was Him Who they told not to get uppity Even though that was Him Who they told to be sure He remembered His place In that Law of theirs In that Order of theirs
The people who pray for freedom Are truly praying for the souls of their oppressors For no unclean thing can enter into the kingdom of God Such is His Law Such is His Order
Oh, they profess to know Jesus But they invite Beelzebub to their barbeques They have Satan over to their socials They ask Lucifer to come to their luncheons Abbadon is an upstanding citizen in their associations Moloch attends their meetings And Gorgo is their government Such is their Law Such is their Order
Then there comes the time when the time has come And the world is wrapped up as a scroll The stars fall from their places And true Law is found And rightful Order is established The people who prayed for the souls of their oppressors to be turned, to be saved, They inherit the earth The people who forgave as they died The people who lived on after they were raped The people who prayed on after they were beaten The people who fasted on after they were cheated The people who did plead for a mighty change to come upon their oppressors Theirs is the kingdom of God Such is the true Law Such is the true Order
Ye have heard that it hath been said, Thou shalt love thy neighbor, and hate thine enemy. But I say unto you, Love your enemies, bless them that curse you, do good to them that hate you, and pray for them which despitefully use you, and persecute you; That ye may be the children of your Father which is in heaven: for he maketh his sun to rise on the evil and on the good, and sendeth rain on the just and on the unjust. For if ye love them which love you, what reward have ye? do not even the publicans the same? And if ye salute your brethren only, what do ye more than others? do not even the publicans so? Be ye therefore perfect, even as your Father which is in heaven is perfect. Such is the true Law Such is the true Order
In 5 months of active combat in World War One, Austria-Hungary, with a population of 51.4 million, had roughly 133,000 soldiers killed in battle. Many more were wounded and taken prisoner, but I’ll focus on that number. 105,000 were on the Russian Front and 28,000 were on the Serbian Front. On both fronts, the Austro-Hungarian armies were frequently ordered to engage in frontal bayonet charges against prepared enemy positions, without preparatory artillery bombardment. Austrian officers often did not speak the languages of their troops and the central command had no coherent plan for war, as it exhausted troops with marches back and forth to different strategic positions on whims and failed to coordinate sufficient ammunition and equipment for front-line troops.
That’s 150 days of combat, roughly, and that works to 887 deaths per day for the army. Adjusted for population to match the USA today, that would mean multiplying by about 6.5: 5766 deaths/day.
True, while the US average of 1200 deaths/day over March-May of 2020 is between a fourth and a fifth of the Austro-Hungarian number, let’s also remember that we’re comparing our numbers to one of the worst-managed armies in the whole of the conflict in this exercise.
The USA spent 200 days in combat in World War One and sustained 53,000 combat and 116,000 total soldier deaths from a population of 92 million. Adjusting for today’s population, that would be equal to 190,684 combat and 417,347 total in those 200 days: 953 per day combat and 2086 per day, total.
Since 1 April, only 7 of the 64 days had less than 953 per day for combat. 16 have been higher than the total deaths per day in World War One for the USA, adjusted for population.
COVID-19 casualties in many other nations are nowhere near wartime numbers, even when adjusted for modern populations. In the USA, they are. That they are speaks to the badly-managed national response to the pandemic. Even if there’s plenty of blame to go around, that all goes back to the person at the top. It all came down to his decisions leading up and during the crisis that set the stage for the needless loss of lives – both buried and permanently wounded from this experience. That we continue to see high daily numbers is testament to the continued failures of the national leadership, of which the president must be the focus of the blame and criticism.
In my reading today, I noted a specific date reference in Alma 49 – to the 10th day of the 11th month, to be specific. That was tied to the march of the Lamanite armies under Amalickiah, with their intent to destroy the Nephites plainly present. At the end of the 48th chapter, Mormon notes the lamentations of the Nephites at the prospect of having to kill people in their defense, as such a killing would deprive them of an ability to accept atonement in their lives – which atonement would be focused on in the first 10 days of the new year, leading up to Yom Kippur.
Well, the great lamentations go with the 9th day of the 11th month, Tisha B’Av, a date set by God as a day of Israelite sorrow in the Book of Exodus. It is the date of the destruction of both Solomon’s and Herod’s Temple as well as the extermination of the Bar Kochba Revolt. And here, in the Book of Mormon, there is what seems to be a reference to that day. The armies that enter Nephite territory on the 10th of Av were surely underway on the 9th.
The “why” of all this is that with such a significant date tied to these events, the existential struggle that spans 12 years and 14 chapters in the Book of Mormon narrative comes forward not just as a regrettable war, but as a calamity on the level of the loss of the Temple in Jerusalem. The walls come crashing down, and the people are left exposed to the wrath of an enemy. They will be destroyed in their wickedness, but preserved if they endure the horrors in righteousness.