Feeds

BOFH: The day the office budget bombed – literally

Explosive network kit Trojan

Combat fraud and increase customer satisfaction

Episode 19

“And this was the extinguisher here, was it?” the Health and Safety feeb asks.

“That’s the one!” I say.

“And you don’t know of any reason how it came to be filled with diesel instead of water?”

“None!” the PFY lies. “But then it may have been like that when we took the building over!”

Luckily the H&S droid isn’t likely to track through our records to find the drum of diesel the PFY ordered for our non-existent generator a year or so back, however to be on the safe side I make a mental note to change the description in the database to something benign like coffee extract.

And buy a generator to replace the one we sold on eBay. A 350W unit should do the trick.

“So no one checked it?”

“I guess not,” the PFY says, “but I’m pretty sure the testing tag and seal were intact on it. Perhaps you should check with the boss?”

“Yes, I will, once the aftereffects of smoke inhalation have worn off. Now do you know how the fire in his office started in the first place?” 
“I’m not sure,” the PFY says. “He said something about his laptop, so maybe that was it?”

"This laptop?" he asks, holding up a mangled mess of melted plastic, electronics and metal sealed in a large ziplock bag.

"It could be, I guess. Though it looks like the fire has pretty much ruined any chance of finding out if the laptop was responsible given its condition."

"Yes, so I suppose you'd suggest that perhaps the battery had a thermal runaway, which we hear so much about these days, and spontaneously ignited his blotter pad?"
 A perfectly believable situation. Far more believable than, say, a small network-addressable incendiary device inside the boss’s “4-port switch”.

“So if we can go back, did you notice anything unusual beforehand?”

“Aaaaahhhhmmm, let me think," I respond. "We were in his office about 10 minutes beforehand – we had a meeting about how the overtime rates were being cut from double time to 1.25 time, along with the requirement to work public holidays when requested.”

“And the meal allowance,” the PFY adds.

“Yes, that’s right, they dropped the meal allowance for anyone in the office for more than 10 hours in a day.”

“And I assume that you weren’t too happy about this?”

“Oh no – I mean these are tough times and the company has to make savings wherever it can,” I sniff. “So we just realised it was for the good of all, and that there comes a time when individual sacrifices need to be made. No doubt those policy recommendations will be adopted once the boss is back from sick leave.”

“So they weren’t actual policy as yet?”

“No, not just yet. It was part of some recommendations he was working on. I think he’d suggested all contractors should pay for their car park spaces and lunches as well.”

“...and?”

“Well it was all perfectly reasonable. After all, they were struggling to be able to give IT middle management a Christmas bonus and needed to make some savings somewhere – which it looks like they’ve done.”

"So it wasn't started by something far less technical - your assistant for instance?"

"Surely not?" I ask, feigning a lack of knowledge - well, truth be told, I had noticed the pronounced curved scar in the plastic lid debris which can only have been made by a fire axe.  The same type of fire axe the company had removed from the building months ago.  The same type of fire axe that the PFY stole several of prior to the arrival of the removal agents.

"I'll think you'll find it was him!" the H&S geek cries.

Combat fraud and increase customer satisfaction

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Microsoft builds teleporter weapon to send VMware into Azure
Updated Virtual Machine Converter now converts Linux VMs too
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.