The Bastard formerly known as Roger

Name. Rank. Operating System

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Episode 14 BOFH 2001: Episode 14

I'm stuck in an office with a couple of glorified beancounters who want to know how we do things here, and why.

The Boss was no help in the matter, displaying all the spine you'd expect from an invertebrate when the idea was passed to him.

"But they're Financial and Technical Security Auditors! - You can't REFUSE to see auditors!" he blurts.

"Of course you can!"

"You can't - it wouldn't pay for us to get a bad Rep in their report."

"At least we'd have consistency across reports," I respond, pointing out the silver lining.

. . .

Half an hour later I'm sitting across a table at mission control from a beancounter/geek who works for some large multinational beancounter outfit with a padful of questions and stacks of time (at a huge hourly rate) to kill.

I don't like it.

"OK, we'd just like to kick this off with an overview of your current topology and systems. Now, what was your name again?"

"I'm afraid that's commercially sensitive information," I respond cheerily.


"It's commercially sensitive. If I tell you and it gets into the wrong hands, who's to know what slave-trading agency would be on the phone the next day trying to headhunt me."

"We COULD find that information out from your Phonebook."

"I'm not in the phone book. No-one in Systems Admin is."

"From the nameplate on the outside of the door then!"

"There isn't one."


"I'm a contractor - A company in other words."

"OK, From your Boss!"

"He's new and doesn't know."

"From your Co-Workers then!"

"They wouldn't tell you. Even if they DID know my real name, which they don't."

"We take security seriously here," The PFY adds, wandering in.

"Well we have to call you something!"

"Yes. I prefer 'The Systems Administrator formerly known as Roger'"

"So your name's Roger then?"


"Your name WAS Roger?"


"So why are you calling yourself the Systems Administrator.. etc"

"Oh, so I can identify myself with a single character from the Symbol font."

"Which one?"

"I don't know its name. Do you have a laptop on you?"


"Then I'll have to draw it."

..ten minutes later...

"Now, what operating systems do you run?"

"Oh, I'm afraid that's commercially sensitive information...."

. . . Two hours later . . .

"So let's see, you can't tell me anything about you, your company, your work, the specifics of your computing resources, where they're located, your disaster recovery plans nor even where nearest fire exit is - because it's all commercially sensitive information?"

"That's correct."

"Why is the fire exit commercially sensitive again?"

"Because a headhunter might be waiting outside it to make me an offer I can't refuse. See, they set the fire alarms off knowing which way I might leave the building. And get me. Happens all the time in big companies."

"So why is there a Fire Exit sign over the door to that fireproof safe over there?"

"Throw off industrial spies," The PFY chimes in, nodding knowingly.

"Yyyessss," the geek finally says, reaching for the phone.

Ten minutes later The Boss arrives, having been sent by a Royal command from somewhere on high.

"Now what's this about 'Commercially Sensitive Information?'" he asks.

"He won't tell us his name," the geek narks up. "He say's it's commercially sensitive."

"And personal information as well," I respond. "My contract states that you can't actually force me to reveal personal information."

"He won't tell me what Operating Systems you run either, nor what types of server you have."

"Why not?" The Boss asks, testily.

"He says it's commercially sensitive information."

The Boss' eyes narrow at this statement, so I head him off at the pass.

"It's simple," I blurt. "I tell them what OS and machines we're running, then they'll ask me about security and what external access methods we have and how they're penetrated. Before you know it, they'll be wanting to know about who routinely penetrates the firewall from within, how they do it, and where they go when they do. I'd then be forced to reveal details of non-web-cached browsing that management believes isn't logged. Which could be, uh, COMMERCIALLY, sensitive."

"Ah! Yes, yes, I'd have to agree! Because if people knew our browsing histories they might be able to, uh.."

"..leave messages on the websites concerned encouraging key members of management to defect to a rival company," I complete.

"Oh Yes, that's it!" The Boss gasps.

Once more, geek two reaches for the phone...

"..leave messages on the websites concerned encouraging key members of management to defect to a rival company.."

"Oh Yes!" the Head of IT gasps.

. . . Five minutes after that. . .

"..leave messages on the websites concerned encouraging key members of the Executive to defect to a rival company.."

"Ah Yes!" the Assistant CEO gasps unhappily.

. . .

"This'll all be reflected in my report to the board!" the beangeek blurts threateningly, hoping to sway someone in the chain of command. "You can't hide things just by saying they're commercially sensitive."

"Funnily enough, that's what the guy who did the audit last year said."

"Did he? I don't remember seeing it."

"Well you wouldn't. It was commercially sensitive. So we locked it in the safe over there."

"He only had ONE copy!?"

"So to speak. Course, It was in his head at the time."

The PFY adds to the overall threat by shutting the door and pulling the roller blind down over the viewing window..

. . .

"Ah.. Well perhaps I was a little hasty.." the beangeek cries, mid-moment-of-clarity. "Perhaps you DO take systems security seriously."

. . .

"You didn't really shut someone in the firesafe last year did you?" The Boss asks.

"Of course not! But it's the same story I used for last year's guy!"

"So what - or who - is in the Fire safe then?" the Head of IT asks suspiciously.

"Oh, I'm afraid that's commercially sensitive information."

It really is easy when you know how. I should be a politician... ®

BOFH is copyright © 1995-2001, Simon Travaglia. Don't mess with his rights.

Beginner's guide to SSL certificates

More from The Register

next story
Docker's app containers are coming to Windows Server, says Microsoft
MS chases app deployment speeds already enjoyed by Linux devs
'Hmm, why CAN'T I run a water pipe through that rack of media servers?'
Leaving Las Vegas for Armenia kludging and Dubai dune bashing
'Urika': Cray unveils new 1,500-core big data crunching monster
6TB of DRAM, 38TB of SSD flash and 120TB of disk storage
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
Zuck's ad empire DOESN'T see details in plain text. Phew!
SDI wars: WTF is software defined infrastructure?
This time we play for ALL the marbles
Windows 10: Forget Cloudobile, put Security and Privacy First
But - dammit - It would be insane to say 'don't collect, because NSA'
Oracle hires former SAP exec for cloudy push
'We know Larry said cloud was gibberish, and insane, and idiotic, but...'
prev story


Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.