Saturday, March 30, 2019

Trump says Navy SEAL accused of a brutal killing to be moved 'to less restrictive confinement'

Navy SEAL

  • Navy SEAL Chief Edward "Eddie" Gallagher is accused of stabbing a teenage ISIS soldier to death and staging a re-enlistment ceremony over the soldier's body.
  • While Gallagher's Article 32 hearing with the Navy progresses, he's being held at San Diego’s Naval Consolidated Brig Miramar.
  • A group of 40 lawmakers led by South Carolina congressman Ralph Norman petitioned on behalf of Gallagher to move him to a "less severe form of restraint."
  • On Saturday morning, President Trump tweeted that Gallagher "will soon be moved to less restrictive confinement."   

President Trump is intervening on behalf of a Navy SEAL who is accused of stabbing a teenage ISIS soldier to death and staging a re-enlistment ceremony over the soldier's body

Trump tweeted on Saturday morning that Navy SEAL Chief Edward "Eddie" Gallagher "will soon be moved to less restrictive confinement while he awaits his day in court."

Gallagher is facing an Article 32 hearing and a potential court-martial; he is accused of murdering a wounded ISIS combatant during a 2017 deployment to Iraq. After an air strike, US forces reportedly captured an ISIS soldier and turned him over to SEALs for medical treatment. While the fighter was receiving treatment, Gallagher allegedly attacked and killed the man, according to Task & Purpose.

Prosecutors say that Gallagher posed with the body, cradling its head for a photo, which he would text with the caption "got him with my hunting knife," according to Task & Purpose.

Read more:A war-crimes prosecution against 2 Navy SEALs just had 2 major setbacks

Gallagher is currently being held at San Diego's Naval Consolidated Brig Miramar, and has been held there since his arrest in September 2018. Gallagher's wife Andrea Gallagher told American Military News that his confinement has made him unable, "to properly prepare for trial, receive medical treatment and see his family."

A group of 40 lawmakers led by South Carolina congressman Ralph Norman urged Navy Rear Admiral Yancy B. Lindsey to move Gallagher to a "less severe form of restraint" as he awaits trial, a letter from the group said.

Congressman Norman directly appealed to President Trump as well.

"This morning, I spoke with President @realDonaldTrump by phone about Navy SEAL #EddieGallagher," Norman tweeted on Friday. "And I want to thank the President for deciding to move Chief Ghallager to less restrictive confinement while he awaits his day in court."

It's not clear when Gallagher will be moved, to where he is being moved, nor is it clear how that process will work. Spokespeople for The White House and the Navy had no comment at the time of reporting.

SEE ALSO: A war-crimes prosecution against 2 Navy SEALs just had 2 major setbacks

Join the conversation about this story »

NOW WATCH: Watch Google's Stadia video-game-platform event in 5 minutes



source https://www.businessinsider.com/navy-seal-eddie-gallagher-donald-trump-2019-3

Friday, March 29, 2019

A 'Call of Duty' player who tricked police in a fatal 'swatting' incident has been sentenced to 20 years in prison

Tyler Barriss Call of Duty Swat

  • Tyler Barriss, 26, of Los Angeles has been sentenced to 20 years in federal prison for calling in dozens of fake reports and bomb threats to the FBI and the Federal Trade Commission, as well as schools, universities, malls, and police departments in more than a dozen different states.
  • A Kansas man, Andrew Finch, was shot and killed by police on December 28, 2017 after Barriss called the Witchia emergency services and claimed that Finch had killed a family member and was holding two others hostage.
  • Barriss used a tactic called"swatting," which uses false reports to mobilize police against what they believe is a dangerous or lethal situation.
  • The U.S. Attorney's Office of Kansas said Barriss made the swatting call following an argument during a "Call of Duty: WWII" match online.

A man convicted of making dozens of false reports to police has been sentenced to more than 20 years in federal prison. The "swatting" case of Los Angeles native Tyler Barriss, 26, garnered national attention after police in Witchita, Kansas shot and killed 28-year-old Andrew Finch outside of his home on December 28, 2017.

On that day, Barriss called Wichita Emergency Services and claimed that Finch had killed his father and was holding his brother and mother hostage. Barriss and Finch did not know each other; Barriss was using a tactic called "swatting" to target a different Kansas native using an old address.

Swatting uses false reports to encourage police to use force against an innocent citizen. In this case, Barriss sent police to the Finch family home to face a threat they believed to be lethal. Later, authorities would determine that the call was made following an argument over a game of "Call of Duty: WWII."

A subsequent investigation showed that Barriss had called in fake bomb threat to the FBI headquarters and Federal Trade Commission as well as schools, malls and emergency workers in more than a dozen states. Barriss pleaded guilty to 51 federal charges in total, based on the false reports and instances where he used people's credit cards without permission.

Barris faced additional state prosecution for his numerous false reports but charges in California and Kansas were dismissed as a part of his plea deal. Barriss will serve the full 20 year sentence and an additional five years of supervised release. The Wichita Eagle reports that he will pay a $5,000 fine to the Kansas Crime Victim's Compensation fund, which will then be given to the Finch family.

Two more "Call of Duty" players are always awaiting trial for their alleged role in the incident. Casey Viner of Ohio and Shane Gaskill of Wichita were reportedly the two "Call of Duty: WWII" players who sparked the incident. The two argued on Twitter, and when Viner threatened Gaskill with physical violence,  Gaskill provided Viner with an old address claiming that he would be there waiting to accept Viner's challenge. Viner then forwarded the address to Barriss and encouraged him to make the swatting call.

"I take full responsibility in what happened to him," Barriss said during the sentencing, according to the Wichita Eagle. He added, "If I could take it back I would. ... I’m just so sorry for that."

Join the conversation about this story »

NOW WATCH: What's going on with Jeff Bezos and Amazon



source https://www.businessinsider.com/fatal-call-of-duty-swatting-incident-20-years-sentence-convicted-2019-3

Wednesday, March 27, 2019

Another group of older ex-employees are suing IBM alleging it targeted older workers for layoffs (IBM)

Ginni Rometty

  • Four former IBM employees have sued IBM, hiring a class-action law firm famous for winning big cases.
  • They are alleging that IBM engaged in a 'massive scheme to cover up discriminatory layoff of over 20,000 older workers in knowing violation of disclosure requirements."
  • IBM says it isn't worried about the lawsuit.
  • But the employees' lawyer tells Business Insider that this suit is different in that it is targeting IBM's decision to not disclose the ages of the people it lays off and arbitration agreements requiring employees to waive their right to sue collectively.

Four former IBM employees have sued IBM, and they've hired a class-action law firm famous for winning big cases.

They are alleging that IBM engaged in a "massive scheme to cover up discriminatory layoff of over 20,000 older workers in knowing violation of disclosure requirements."

IBM says it isn't worried about the lawsuit. "The plaintiff's theories have been rejected by courts, including the U.S. Supreme Court. We are confident that our arbitration clauses are legal and appropriate," an IBM spokesperson tells Business Insider.

The fact that IBM has been laying off thousands of workers for years without disclosing the size of its layoffs, while hiring thousands of others, has been well documented. And allegations that many of the people getting pink slips have been its older workers have also been the source of multiple investigations.

Bloomberg wrote about it in 2014, after IBM changed how it discloses layoff information. There are laws requiring companies to share age information about the people it is letting go but IBM stopped doing that in 2014 and instead offers its workers the option of filing individual lawsuits, should they feel they have a case when taking a severance package.

Read: A laid-off Oracle cloud developer says there's been a power struggle between Oracle's Seattle and Silicon Valley offices — and Seattle won

By signing an arbitration agreement, each employee that believes he or she was discriminated against on the basis of age would then have to front the costs of suing IBM for the legal discovery and statistical analysis of its layoffs. 

Business Insider wrote about the situation in 2015 and in 2016, when laid off employees told Business Insider that IBM had reduced severance pay for long-time workers to a month max. And Pro Publica delved into allegations of age discrimination during layoffs last year.

One lawyer representing the former employees, Joe Sellers from law firm Cohen Milstein Sellers & Toll, tells Business Insider that IBM's statement is a bit of red herring. Cohen Milstein Sellers & Toll is a well-known class-action law firm that's won hundreds of millions of dollars against the likes of Apple, Caterpillar, Citigroup, Mercedes Benz, BP, Bristol-Myers Squibb and many others.

Sellers says that this lawsuit is not attempting to get the court to rule out arbitration agreements. He says his clients are honoring the agreement and have also filed suits with arbitrators.

This lawsuit isn't challenging the arbitration agreements per se. It's challenging the part where employees waived their rights to sue collectively, arguing that IBM did not first give them the information about the ages of the people being laid off, as, he says, is required by law.

"The only issue presented to the court is whether or not to enforce the waiver [to sue collectively]," he said.

And that means this lawsuit is different from the one filed by IBM employees last fall. That age discrimination lawsuit was filed by people who didn't sign a waiver that prevented them from suing collectively in exchange for severance, he said.

Sellers says his clients are those that did sign those waivers. He's trying to represent an estimated 20,000 people who also did. He believes that his case will allow these IBM workers to sue the company in court and not be liable for having to return their severance checks. 

"Our position is that the waivers that people signed — some people only got a month's payment, others got more than a month’s payment — are unenforceable.  So individuals can keep whatever they got paid and join this lawsuit," he says.

Ultimately, between the suit filed in arbitration and the one filed in court, this lawsuit seeks damages for what its plaintiffs say were age-discrimination practices.

"I did my job very well and received glowing remarks on my annual evaluations for 33 years,” said one of the plaintiffs, Cheryl Witmer, in the law firm's press release. Witmer says she was laid off in 2016 at age 57. “Suddenly in my 34th year, I was unfairly downgraded in my annual evaluation. Nothing about my work changed; what changed is that IBM decided to replace me with a much younger worker."

Sellers tells Business Insider that, through the lawsuit, he ultimately wants to stop IBM from "relying on stereotypes about older workers to force people out of work. There were, undoubtedly, some older people who may be better suited to other jobs. But there are lots of people in the workforce who are older, with a good deal of technical expertise at a company that values technical expertise, who should have been evaluated on their merits."

Join the conversation about this story »

NOW WATCH: Elon Musk sent a $100K Tesla Roadster to space a year ago. It has now traveled farther than any other car in history.



source https://www.businessinsider.com/older-former-ibm-employees-sue-company-alleging-age-discrimination-2019-3

50 women are suing Salesforce, accusing it of selling software to an online sex marketplace that pleaded guilty to human trafficking (CRM)

Marc Benioff

  • 50 women who say they were sexually abused as victims of a sex marketplace called Backpage are suing Salesforce.
  • They allege that the San Francisco software company, known for its actions on civil rights, helped Backpage run its business by providing software and consulting services.

Fifty women who say they were sexually abused as victims of a sex marketplace called Backpage are suing the software company that they say helped Backpage run its business: Salesforce.

The women allege that the San Francisco software company — known for its support of women's rights and other social issues — helped Backpage run its business by providing software and consulting services, as was first reported by CNBC's Sara Salinas.

Backspace became notorious in the spring of 2018 when the website, known for its sex ads that included offering women and children, pleaded guilty to human-trafficking charges in Texas. The site was also facing federal charges and charges in other states. In April 2018, US authorities seized the site's assets and shut it down.

The lawsuit alleges that Salesforce, while publicly decrying human trafficking and touting how it was helping to stop it, was also providing software and services to help Backspace grow its business.

The suit says:

Salesforce didn't just provide Backpage with a customer-ready version of its data and marketing tools. Salesforce designed and implemented a heavily customized enterprise database tailored for Backpage's operations, both locally and internationally. With Salesforce's guidance, Backpage was able to use Salesforce's tools to market to new 'users' — that is pimps, johns and traffickers — on three continents.

The suit also charges that Salesforce took on Backpage as a customer in December 2013, and it included a picture of an alleged invoice from Salesforce to Backpage for 2016 through 2018.

Read more: A laid-off Oracle cloud developer says there's been a power struggle between Oracle's Seattle and Silicon Valley offices — and Seattle won

A Salesforce spokesperson told Business Insider that the company doesn't comment on pending litigation, but added: "We are deeply committed to the ethical and humane use of our products and take these allegations seriously."

This isn't the first time Salesforce has faced repercussions because of its clients.

Last year, protests erupted over Salesforce's contracts with the US Customs and Border Protection (CBP) agency after the public outcry over how it was performing family separations at the border. Employees protested and demanded that the company cancel the contract with the agency. A nonprofit group that provides legal services to immigrants rejected the company's $250,0o0 donation. But the company says its software is not involved in family separations.

Still, protests of the company over the issue persist.

Salesforce is a particularly interesting target for such a suit because the company has made itself a champion of human-rights causes, such as women's rights and fair pay and LGBTQ civil rights, and it backs a new tax of tech companies in San Francisco that raises money to combat homelessness.

Earlier this year, the company also appointed a chief ethics officer and started an organization in the company, called the Office of Ethical and Humane Use, to develop policies and strategies to ensure technology is used in humane ways.

Here's the full copy of the suit:

SEE ALSO: Oracle customers fear its reaction if they use Amazon's or Microsoft's cloud, survey shows

Join the conversation about this story »

NOW WATCH: Watch Google's Stadia video-game-platform event in 5 minutes



source https://www.businessinsider.com/50-women-suing-salesforce-allegation-sex-trafficking-customer-2019-3

Monday, March 25, 2019

Nike responds to Michael Avenatti's arrest: 'Nike will not be extorted'

Michael Avenatti

  • Lawyer Michael Avenatti was arrested and charged with attempting to extort $20 million from sportswear brand Nike on Monday.
  • He allegedly tried to force Nike to pay up by "threatening to use his ability to garner publicity to inflict substantial financial & reputational harm on the company if his demands were not met," according to the criminal complaint filed in the Southern District of New York.
  • Avenatti claimed he had information related to the NCAA basketball scandal.
  • Later Monday, Nike responded by saying that it was complying with federal investigations in NCAA basketball and "will not be extorted."

Nike has issued its first public response to allegations that Michael Avenatti attempted to extort the company.

The lawyer, who reached notoriety for representing Stormy Daniels in past years, was arrested and charged with attempting to extort $20 million from sportswear brand Nike on Monday.

He tried to force Nike to pay up by "threatening to use his ability to garner publicity to inflict substantial financial & reputational harm on the company if his demands were not met," according to the criminal complaint filed in the Southern District of New York.

Nike issued its first response to the allegations later on Monday.

"Nike will not be extorted or hide information that is relevant to a government investigation," the company told Business Insider in a statement.

The information Avenatti attempted to use to extort Nike related to the NCAA basketball scandal, which broke in 2018, the complaint says. A former executive of Adidas was convicted in 2018 of bribing high school athletes and their families to attend universities associated with the brand. Nike was not implicated, but was served subpoenas in connection in 2017.

Read more: Nike's youth basketball league has reportedly been hit with subpoenas in connection with the college basketball bribery scandal

In its statement, Nike said it had nothing to hide.

"Nike has been cooperating with the government’s investigation into NCAA basketball for over a year," the statement read. "When Nike became aware of this matter, Nike immediately reported it to federal prosecutors."

Nike also said that when it learned of Avenatti's extortion attempts and Avenatti's claims of damaging information, it referred both to federal authorities.

"When Mr. Avenatti attempted to extort Nike over this matter, Nike with the assistance of outside counsel at Boies Schiller Flexner, aided the investigation," the company told Business Insider.

SEE ALSO: 2 of Adidas' best-selling sneakers aren't cool anymore, and now the company is betting huge on Kanye West

Join the conversation about this story »

NOW WATCH: We visited a cashmere factory that makes $500 sweaters to find out what makes the material so expensive



source https://www.businessinsider.com/nike-responds-to-michael-avenatti-arrest-and-extortion-charge-2019-3

Friday, March 22, 2019

Meet the man behind the Trump-Russia investigation: the special counsel Robert Mueller

Robert Mueller

  • For almost two years, Robert Mueller has been leading the special counsel investigation into Russian election interference — and whether the Trump campaign coordinated with the Kremlin.
  • Previously, he was the longest-serving FBI director since J. Edgar Hoover. Mueller was nominated to the position by President George W. Bush, and sworn in a week before 9/11.
  • On May 17, 2017, former Deputy Attorney General Rod Rosenstein appointed Mueller special counsel to take over the Russia investigation.
  • Since then, he's drawn President Donald Trump's ire.
  • Here's a look at Mueller's career, and how got to where he is now.

The special counsel Robert Mueller, 74, submitted his full report on the Russia investigation to the attorney general on Friday.

That probe was also examining whether the Trump campaign colluded with the Kremlin, and if President Donald Trump has obstructed justice while in office.

In Washington, Mueller has a reputation for being a tenacious investigator. Both Republicans and Democrats welcomed his appointment in May 2017 with bipartisan backing.

His team has indicted dozens of people, companies, and entities in the investigation so far, but the breadth and length of his investigation irked many Trump supporters, and the president himself.

Mueller's colleagues, meanwhile, say he has proven his bipartisan bona fides over the years. After all, he served under both Republican and Democratic presidents as FBI director and as an attorney in the Department of Justice.

Here's what you need to know about Mueller:

SEE ALSO: Here's how long investigations like the one into Trump and Russia usually last

SEE ALSO: Here's everyone who has been charged in Mueller's Russia probe so far

Born Robert Swan Mueller III in New York City in 1944, "Bob" grew up in the suburbs of Philadelphia, the elder brother to four younger sisters. Their father was an executive at DuPont. He captained the soccer, hockey, and lacrosse teams in high school.

Sources: FBI, St. Paul's School



Mueller went to undergrad at Princeton University, got his Master's in international relations from New York University, and graduated from the University of Virginia School of Law in 1973.

Source: FBI



When one of his friends died in the Vietnam War, Mueller was inspired to join the military. He had been previously pursuing a career in the medical field.

Source: Princeton Alumni Weekly

 



See the rest of the story at Business Insider

source https://www.businessinsider.com/robert-mueller-bio-photos-trump-russia-investigator-history-2017-10

Wednesday, March 20, 2019

YouTube has shut down a popular channel after the mother was charged with allegations of abusing her children

machelle hackney fantastic adventures youtube

  • YouTube creator Machelle Hackney, behind the popular channel "Fantastic Adventures," has been arrested in connection with allegations she beat and starved her children who starred in the videos.
  • Her seven adopted kids reportedly told officers they were punished when they didn't follow direction or during filming for the YouTube channel, which has more than 800,000 subscribers.
  • Since the arrest, YouTube says the channel has been "demonetized," and the channel was terminated Wednesday afternoon.

YouTube shut down a popular channel about a family's zany adventures on Wednesday following allegations that the woman making the videos was abusing her children.

Police in Arizona arrested Machelle Hackney earlier this month in connection with allegations of child abuse. Hackney runs the YouTube channel "Fantastic Adventures," which has amassed more than 800,000 subscribers with videos of her seven adopted kids performing in sketches, embarking on superhero-themed adventures, and running around with nerf guns.

But police say that the picture presented online is far from what life was like when the camera wasn't rolling.

Hackney punished the kids with starvation, beatings, and restricted access to the bathroom when they didn't follow proper direction or forgot their lines during filming for YouTube videos, according to records from police in Maricopa, Arizona, who performed a wellness check on the family at their home. 

YouTube terminated the account on Wednesday afternoon for "violating YouTube's Community Guidelines." All details of the channel, and its videos, have been removed from the video-sharing platform.

When police performed the welfare check, officers found children who "appeared to be malnourished, due to their pale complexion, dark rings under their eyes, underweight, and they stated they were thirsty and hungry," according to the Washington PostOne of the children told police they hadn't attended school "in years," and instead spent his time "in the green screen room" where YouTube videos were filmed, the Post reports. 

Some of the kids detailed instances of abuse to police, Buzzfeed News reports. One kid said Hackney had pepper-sprayed her vagina, and another said she "would pinch the tip of his penis with her nails until it bled."

"We take safety on YouTube very seriously," YouTube said in a statement. "We work closely with leading child safety organizations and others in our industry to protect young people. When we’re made aware of serious allegations of this nature we take action."

 

YouTube had initially demonetized the channel when it was made first made aware of the arrest. That means that YouTube had marked the "Fantastic Adventures" videos as not "advertiser-friendly," so the channel wasn't able to make revenue from ads that appear before (and during) YouTube videos.

Hackney is being held in jail without bond on seven counts of child abuse, five counts of unlawful imprisonment and two counts of child molestation, NBC News reports. Her adult sons, Logan and Ryan Hackney, reportedly face charged for failing to report abuse.

Hackney reportedly denies abusing her children, and said the only type of punishment she has used is spanking and grounding them, according to NBC News. Since Hackney's arrest, all seven of the adopted children in Hackney's care have been removed from the home, NBC News says. 

YouTube doesn't provide numbers on how much specific creators make from their videos. But SocialBlade, a site that tracks various YouTube metrics, estimates that the "Fantastic Adventures" channel could earn anywhere from $8,900 to $142,400 each month.

Previously, YouTube said it would only terminate the account "upon conclusion of an investigation." This is a stance that the platform has taken in the past, such as with the SevenAwesomeKids channels. The owner of the channels, Ian Rylett, was first arrested in 2018 in connection with allegations of child abuse. The collection of SevenAwesomeKids channels wasn't terminated until earlier this month, after Rylett pleaded guilty to child abuse charges, Tubefilter reported.

Just last month, YouTube announced it would be turning off comments on videos featuring children and minors "that could be at risk of attracting predatory behavior." YouTube has been facing criticism for its lack of action in keeping children on the platform safe, and the discovery of predatory comments made on millions of videos with children.

Join the conversation about this story »

NOW WATCH: What's going on with Jeff Bezos and Amazon



source https://www.businessinsider.com/youtube-terminates-fantastic-adventures-following-child-abuse-allegations-2019-3

Wednesday, March 13, 2019

Facebook is reportedly under criminal investigation over deals that gave Apple, Amazon, and other companies access to user data (FB)

MarkZuckerberg2016

Federal prosecutors have opened a criminal investigation into data-sharing deals struck between Facebook and over 150 other companies, reports the New York Times

Under the terms of those deals, which the Times first reported in December, Facebook allowed partners including Apple, Amazon, and Microsoft to access personal user data, including friend lists, contact information, and sometimes even private messages — and not always with the user's consent.

Most of those partnerships have ended over the last several years. 

According to the New York Times report, a grand jury in New York has already subpoenaed information on these types of deals from at least two smartphone and other device manufacturers involved. 

“We are cooperating with investigators and take those probes seriously,” a Facebook spokesperson told the Times. “We’ve provided public testimony, answered questions and pledged that we will continue to do so.”

Facebook did not respond to an immediate request for comment from Business Insider.

This story is developing...

Join the conversation about this story »

NOW WATCH: Everything we know about Samsung’s foldable phone



source https://www.businessinsider.com/facebook-criminal-investigation-data-sharing-2019-3

Tuesday, March 12, 2019

7 unforgettable leadership lessons from the ancient Roman conqueror Julius Caesar

Julius Caesar

  • Julius Caesar was assassinated on the Ides of March over 2,000 years ago.
  • Caesar held a number of roles over the course of his career, serving as a high priest, general, and dictator.
  • His actions and assassination contributed to the downfall of the faltering Roman Republic.

Julius Caesar had a pretty bad day at work on March 15, 44 BCE. The dictator of Rome was lured to a meeting and stabbed to death by his coworkers.

He would've done well to beware the Ides of March.

Several years earlier, the politician and general had rose to power in a civil war. His assassination sparked yet another civil war that doomed the Roman Republic. The state ended up mutating into an empire, with Caesar's adopted heir Octavian at the helm.

Today, Caesar is still considered one of the greatest military commanders in history. His name is also synonymous with cults of personality and political strongmen.

So how exactly did the one-time high priest of Jupiter accrue so much power during his lifetime?

Business Insider looked through some of his own writings — as well as the less-reliable but still interesting works of contemporary ancient writers — to get a sense of his leadership style.

SEE ALSO: 9 timeless lessons from the great Roman emperor Marcus Aurelius

DON'T MISS: I read the 87-year-old book recommended by Elon Musk, and my favorite chapter reveals the dark side of innovation and adventure

1. Presentation matters

The best leaders don't just do amazing things — they know how to present a compelling story.

After a relatively brief war with a certain Pharnacles II of Pontus, Caesar had to sit down and write out a report to Rome detailing his conquest. According to both Greek biographer Plutarch and Roman historian Suetonius, the commander didn't go into too much detail, writing simply: "I came, I saw, I conquered."

The phrase proved so catchy that we still remember it, centuries later.

Caesar could have gone on and on about his military prowess (in fact, he was the author of several long military accounts). Instead, he realized that the simple note would convey the most powerful message.



2. Take risks

In ancient Rome, crossing the Rubicon River with an army was kind of a big deal. It was tantamount to a declaration of war and could be punishable by death.

When Caesar crossed the Rubicon with his legion, he put everything on the line. In "The Life of the Deified Julius," Suetonius writes that Caesar quoted an Athenian playwright as he crossed the river, declaring "the die is cast."

He risked it all and it paid off (in the short-term, at least).



3. There's nothing wrong with starting small

Oftentimes, you've got to start out as a large fish in a small pond in order to succeed as a leader.

Caesar understood this. He managed to climb back into a position of power, even after losing his inheritance in a coup as a young man.

According to the ancient Plutarch's "Parallel Lives," the general also made a rather curious remark while passing through a small village in the Alps: "I assure you I had rather be the first man here than the second man in Rome."



See the rest of the story at Business Insider

source https://www.businessinsider.com/ides-of-march-leadership-lessons-julius-caesar-2017-3

Sunday, March 10, 2019

The NSA publicly released a tool for cracking software wide open, and hackers are loving it — so long as the NSA makes good on its promise not to use it to spy on them

Nakasone cyber command

  • On Tuesday, the National Security Agency made its Ghidra — its tool for reverse-engineering software — available as open source, which means anyone can use or modify it for free.
  • Anybody can use it as a free cybersecurity tool for disassembling suspicious files, analyzing malware, and testing for vulnerabilities.
  • Since the Ghidra tool is free, this increases access for people to use it in both professional and educational settings — potentially making for a safer internet, even as it could introduce new people into the profession of cybersecurity, experts say. 
  • The NSA promises that there are no backdoors or other methods of spying built in to Ghidra, but hackers have gone over the code with a fine-tooth comb to double-check that claim. 

It's been almost a week since the National Security Agency released a free software tool for picking apart suspicious files, and security enthusiasts are already poring over the code to hunt for bugs and backdoors. And once the project's completely online for people to modify, developers will scramble to make this tool even more powerful, experts say.

On Tuesday, the NSA released an open source project called Ghidra, a software reverse engineering framework developed by NSA's Research Directorate for NSA's cybersecurity mission. The secretive spy agency originally developed Ghidra to analyze attacks and cybersecurity risks on government agencies and other organizations. Like individuals and companies, government agencies are also prone to cybersecurity attacks, including ones from other countries. 

Right now, the code is only available to download, but the NSA is in the process of putting the project onto code hosting site GitHub. And once that happens, experts expect to see enhancements from amateur and professional security developers roll out soon — making the tool even more robust, and a major reason why the NSA likely chose to release a formerly closed project, experts say. As an open source project, Ghidra can be used or modified by anyone for free.

In the meantime, the release of Ghidra has provoked a frenzy of activity as malware researchers, hobbyists and even the conspiracy-minded dissect the software and put it through its paces, assessing its capabilities and seeking to allay the inevitable suspicions about the spy agency's gift. 

"If you have security concerns about Ghidra, do what I do and install all your research tools inside a Virtual Machine," suggested MalWare Tech, a verified Twitter user with 141,000 followers.

Read more: A former Marine explains how her service helped prepare her to lead a new open source initiative for $3.3 billion startup Rubrik

Making Ghidra open source benefits NSA, experts say. It can be costly to work on improving Ghidra, but as an open source tool where anyone can modify it, an online community of developers can work to improve it much faster. It can also encourage recruitment and community interaction with th NSA, Graham says.

"The significance is that the product can be improved by the community instead of being solely funded by the NSA. Development of such a product is costly, and even the NSA doesn't have unlimited funds. It'll be great demonstration of the value of open-sourcing internally developed projects," Rob Graham, consultant and owner at Errata Security. told Business Insider in a Twitter DM.

What is reverse engineering?

Reverse engineering helps users recover information needed to understand cybersecurity risks. For example, when there's a suspicious file, it can be hard to find the specific issues with that file. But with reverse engineering, a person can disassemble the file to figure out how it works and what risks it might have — essentially, working backwards.

This is similar to figuring out how a dish is prepared at a restaurant so you can make it at home. With Ghidra, people can inspect suspicious code, analyze malware and test for vulnerabilities. 

Ghidra's technology isn't anything new as there are currently commercial reverse engineering tools available, but as an open source tool, it increases access for people to work with reverse engineering, says Jon Amato, research director for Gartner's technical professionals security and risk management strategies team.

"It lowers the bar for entry for people who can do reverse engineering in the industry and are frustrated and priced out for commercial tools," Amato told Business Insider.

Ghidra is not as sophisticated as some commercially available tools, Amato says, but it's still a "good first start" for people who want to get their hands dirty with reverse engineering. Plus, right now, commercial tools can cost thousands of dollars a year. Although the NSA has released a set of other open source projects, this is the first open source tool specifically for analyzing malicious code and malware-like viruses.

"This functionality has been in freeware and commercial based tools for years," Amato said. "The problem was commercial tools were crazy expensive. [Ghidra] competes with more commercial tools in that in can do a bunch of different stuff but it can do it for free.

Amato says that this tool isn't a general purpose security tool, but rather, a niche tool that would only be used in specialized security jobs. That being said, now that the tool is free, he believes that Ghidra will likely be used as a teaching tool in colleges and universities — giving students access to learning about this specialized type of cybersecurity technology.

"We'll start to see this used in academic classroom environments because some of the commercial tools can be a little difficult to gain licenses for even for academic environments," Amato said. "The learning ecosystem is going to be the first and most immediate change we'll see."

Skepticism

Still, some users were skeptical about the announcement. Ghidra has already been around for years, and it's likely that the NSA has replaced its internal tools for reverse engineering, says Jerry Gamblin, principal security engineer at Kenna Security.

"It was known to exist, and because it had lost internal value and it wasn't a tool that was going to drastically make the Internet safe, it allows them to give something back to the security community," Gamblin told Business Insider. "It's good timing for the NSA."

The fact that it's from the NSA may also deter some users from using this tool, but otherwise, since Ghidra's release, the security community has already started sifting through the code to try out the code and to look for bugs.

“There is no backdoor in Ghidra,” Robert Joyce, NSA senior advisor, said at RSA on Tuesday. “This is the last community you want to release something out to with a backdoor installed, to people who hunt for this stuff to tear apart.”

Here's what people are saying about Ghidra.

 

SEE ALSO: Microsoft is seriously closing the gap with Amazon in the cloud wars, according to a survey of IT professionals

Join the conversation about this story »

NOW WATCH: Everything we know about Samsung’s foldable phone



source https://www.businessinsider.com/nsa-ghidra-open-source-reverse-engineering-security-tool-2019-3

Saturday, March 9, 2019

'About as likely as Mexico paying for Trump's wall': Some experts say Elizabeth Warren's plan to break up Big Tech will never happen

Elizabeth Warren

  • On Friday, presidential hopeful Elizabeth Warren laid out a plan to break up tech giants like Facebook, Amazon, and Google by forcing them to divest from major acquisitions.
  • Warren cited Facebook's acquisition of WhatsApp and Amazon's purchase of Whole Foods as mergers she would "unwind" for being anti-competitive. 
  • It's a bold plan, but experts tell us its unlikely to happen given the history of antitrust cases and how difficult it would be to carry out. 

On Friday, presidential hopeful Elizabeth Warren laid out a plan to break up tech giants like Facebook, Amazon, and Google by forcing them to divest some of their biggest acquisitions.

Warren cited Facebook's acquisition of WhatsApp and Amazon's purchase of Whole Foods as anti-competitive mergers she would "unwind." 

It's a bold plan, but experts tell us it's unlikely to happen given the history of antitrust cases and how difficult it would be to carry out. 

Read more: Elizabeth Warren says she wants to break up big tech companies, including Amazon, Google, and Facebook

To establish precedent, Warren wrote that "America has a long tradition of breaking up companies when they have become too big and dominant." But for NYU Law Professor and antitrust expert, Harry First, that interpretation is questionable. 

"To say there's a long tradition of this would be charitable," First said. "There have been some major breakups based on violations of antitrust laws. You have American Tobacco, you have Standard Oil, you have AT&T, but over time, not so many because it's so hard to do." 

Michael Pachter, Managing Director of Equity Research at Wedbush Securities, says the difficulty would likely be political — getting both Democrats and Republicans to agree on the necessary policy changes needed to carry out Warren's proposal. 

"If Congress changes the antitrust laws, perhaps it could [happen], but that is a remote possibility and unlikely to be a high priority for either the House or Senate," Pachter said. "[It's] about as likely as is Mexico paying for Trump's wall." 

 

Scott Berg, Managing Director and Senior Analyst at Needham & Company, doesn't see the feasibility in breaking up major tech companies because of the interconnectedness of their products. 

"A lot of the value that Google has seen in the Maps platform, for instance, comes from all the data that they have from Search," Berg said. "So if you try to segregate some of those business units, you're actually going to remove a lot of the value there that you're giving to consumers." 

In the past, Berg said, breaking up a telecoms or oil giants would have been easier because their product offerings  weren't as integrated as they are today. Instead, businesses could be broken up simply by region, he said. 

For Berg, needing to break up a company would also imply it had a monopoly over a certain industry to begin with and to him, that isn't the case with the example companies Warren provided. 

“Take Amazon Web Services platform. AWS has done great, but Microsoft and Google are making big strides there as well.” Berg said. "On the Google side, yes they’ve done a lot with search, but outside of search, which of their products is super dominant out there in terms of being about to have a monopoly?”

Regarding how he imagines investors will react to increasing talk of breaking up the tech industry, Berg doesn't think there should be too much cause for concern. 

“It’s headline news and in that particular day, maybe it has the chance to move the stock a percent or two, but over a longer term duration, I think the impact is minimal," he said. 

On Friday, major tech stocks were relatively flat. 

For University of Michigan Law professor Daniel Crane, the problem with Warren's plan to break up big tech can be summed up with her botched interpretation of Microsoft's antitrust suit in her statement on Friday. 

"What's the punch line of Microsoft case? Let's not break up Microsoft," Crane said. "When you look at what [Warren] wants to do — which is two things, break up [tech companies] and transform them into public utilities — that's exactly the opposite of the concept of [the] Microsoft [case]. Microsoft is, 'Let's restore competition by eliminating the practices that Microsoft engaged in that were exploiting innovation.'" 

SEE ALSO: Here are all the wild things, from wave pools to turmeric coffee creamer, that WeWork's surfing founder has invested in

Join the conversation about this story »

NOW WATCH: Amazon will pay $0 in federal taxes this year — here's how the $793 billion company gets away with it



source https://www.businessinsider.com/experts-question-warrens-plan-to-break-up-big-tech-2019-3

Friday, March 8, 2019

Whistleblower Chelsea Manning is in jail again and could face up to 18 months behind bars despite facing no criminal charges

Chelsea Manning 2019

  • Whistleblower Chelsea Manning was sent to jail again on Friday after refusing to testify in front of a grand jury probing WikiLeaks and Julian Assange, according to multiple news outlets. 
  • Manning's attorney Moira Meltzer-Cohen told INSIDER that she could serve up to 18 months in prison despite being accused of no crime. 
  • Meltzer-Cohen said the tactic was a form of "coercion" meant to probe Manning into testifying. 

Whistleblower Chelsea Manning, a former US Army analyst who leaked troves classified information to WikiLeaks, was jailed again on Friday after she refused to testify in front of a grand jury that is reportedly probing WikiLeaks and Julian Assange, according to numerous news outlets.

Despite being accused of no crime, Manning faces up to 18 months in jail.

"Chelsea can be incarcerated for the remainder of the grand jury [up to 18 months], and the term of the grand jury can be extended by six months,” Manning's attorney Moira Meltzer-Cohen told INSIDER.

Moira Meltzer-Cohen said Manning was held in contempt of court under the “the recalcitrant witness statute," which specifically pertains to "someone who is refusing to give testimony before a grand jury."

Despite being accused of no crime, the statute allows individuals to be confined "in a 'suitable place,'" for no more than 18 months, while the grand jury is underway.

"The only lawful purpose for such confinement is to coerce them to change their mind and give testimony. So they can’t be punished for a refusal to testify, but they may be 'civilly confined' to see if they will agree to change their mind and give testimony," said Meltzer-Cohen.

Read more: Whistleblower Chelsea Manning arrested after refusing to testify in secret WikiLeaks case

"Today’s decision was not unexpected, but it’s an appealable order,” she continued.

In a statement, Manning said she refused to answer the questions of the grand jury, whose proceedings are under seal. In response to each question, she said she answered, "I object to the question and refuse to answer on the grounds that the question is in violation of my First, Fourth, and Sixth Amendment, and other statutory rights."

"All of the substantive questions pertained to my disclosures of information to the public in 2010 — answers I provided in extensive testimony, during my court-martial in 2013," her statement continued.

WikiLeaks alleged in January that federal prosecutors have been working to secure testimony for a grand jury pertaining to criminal charges being levied by the Trump administration. 

In a statement, Manning's support committee, Chelsea Resists, called the ruling punitive, and pointed to previous statements from President Donald Trump about Manning, saying, "It is no secret that members of the current administration have openly expressed their hatred for Chelsea. Donald Trump himself has tweeted about his desire to undo Barack Obama's commutation and put Chelsea back in jail."

The judge rejected Manning's lawyer's request that she be confined at home due to medical and safety concerns.

"It has always been our intent and hope for her to testify and comply with the valid court order and valid grand jury investigation," federal prosecutor Tracy Doherty-McCormick said in a statement relayed to The New York Times. "Ms. Manning could change her mind right now and do so. It is her choice. This is a rule of law issue, and Ms. Manning is not above the law."

Manning isn't the first high-profile person to face jail after allegations of civil contempt. Susan McDougal spent 18 months in jail after she refused to answer three questions pertaining to the Whitewater scandal that surrounded President Bill Clinton, according to CNN.

In 2006, Greg F. Anderson, personal trainer to then-San Francisco Giants' player Barry Bonds, was held in contempt twice after refusing to testify for two different grand juries investigating perjury charges against Bonds. Anderson was held in jail for over a year until Bonds was indicted in 2007.

In February, an appeals court sided with a lower court in ruling that Roger Stone associate Andrew Miller was in contempt for refusing to testify in front of a Mueller grand jury, according to CNN. It's not clear whether Miller will testify, continue to fight the subpoena, or be jailed.

SEE ALSO: U.S. prosecutors press witnesses to testify against Assange: WikiLeaks

Join the conversation about this story »

NOW WATCH: Scientists completed one of the most detailed explorations inside the Great Blue Hole. Here's what they found at the bottom of the giant, mysterious sinkhole.



source https://www.businessinsider.com/chelsea-manning-could-face-18-months-in-jail-after-grand-jury-silence-2019-3

A Facebook funeral party at its HQ once descended into violence, and security suspected gang involvement (FB)

facebook campus party

In July 2013, Facebook's beloved head chef Josef Desimone died in a motorcycle accident.

To commemorate him, the company threw a blowout party on campus at its Silicon Valley headquarters one Saturday the following month. Hundreds of people were invited, and booze flowed freely as Facebook's employees and contract workers gathered to celebrate Desimone's life.

And then it descended into chaos.

Multiple fights broke out among attendees, which security staff believe were gang-related, sources said. The event culminated in one kitchen worker being beaten so badly by another attendee on Facebook grounds that they were hospitalised.

The assailant was barred from Facebook's campus but he continued to sneak back — to visit his mother who worked there.

The incident highlights the challenges Facebook's security team faces as it polices the Silicon Valley technology firm — not only to defend the company from outside threats but also, sometimes, to protect workers from one another.

Business Insider has spoken with current and former employees and reviewed internal documents for an in-depth investigation into how Facebook handles its corporate security, which you can read here.

Sources described a hidden world of stalkers, stolen prototypes, state-sponsored espionage concerns, secret armed guards, car-bomb concerns, and more. Today, there are a staggering 6,000 people in Facebook's global security organisation, working to safeguard Facebook's 80,000-strong workforce of employees and contractors around the world.

When numerous employees' headphones were disappearing a couple of years ago, the company installed a covert mobile camera to monitor desks, a source said. (The sting operation caught an employee stealing them to sell online. A Facebook spokesperson said items are sometimes misplaced during office moves, and then misreported as thefts.)

But Silicon Valley's tradition of openness can complicate things, such as the time when an old prototype of an Oculus virtual-reality headset was stolen from a conference room. Facebook — like many companies — doesn't have surveillance cameras inside its offices, and the enormous open-plan design of the office meant that the pool of suspects would likely be hundreds of people, with no way to narrow it down. There was nothing security could do; the prototype was never recovered.

"The business has identified that we really need that open office environment that promotes our collaboration, and so that's the risk we're willing to accept inside an office is that open office environment," Facebook corporate-security chief Nick Lovrien said about Facebook's approach to openness. "So what we then look at is how we mitigate that risk," from proactively sifting through intelligence to putting physical checkpoints in place and manning the perimeter of the offices.

At least one employee has been caught letting in tourists who wanted to take unauthorized tours of the facilities, and employees are also caught having sex in the office about every three months, on average. (Human resources may be alerted, but the couple isn't typically fired.)

Read the investigation into Facebook's corporate security »


Do you work at Facebook? Contact this reporter via Signal or WhatsApp at +1 (650) 636-6268 using a non-work phone, email at rprice@businessinsider.com, Telegram or WeChat at robaeprice, or Twitter DM at @robaeprice. (PR pitches by email only please.) You can also contact Business Insider securely via SecureDrop.

Join the conversation about this story »

NOW WATCH: Why Amazon canceled HQ2 in New York City and what it means for everyone involved



source https://www.businessinsider.com/facebook-2013-memorial-party-chef-violence-gangs-2019-3

Whistleblower Chelsea Manning arrested after refusing to testify in secret WikiLeaks case

Chelsea Manning

  • Whistleblower Chelsea Manning has been arrested after she refused to testify before a federal grand jury on matters relating to her 2010 disclosure to WikiLeaks, multiple news outlets are reporting.
  • On Friday, a judge ruled that Manning would be jailed until the grand jury's proceedings are over, or until she decided to testify, holding her in contempt of court.
  • Manning was previously imprisoned for 7 years relating to her WikiLeaks disclosures. Her 35-year sentence was cut short after President Barack Obama granted her clemency.
  • Manning was vocal about her struggles in prison, where she attempted suicide twice, and underwent gender transition despite being continually held in a men's prison.

Chelsea Manning, the former US army analyst and whistleblower who leaked troves of classified material to WikiLeaks in 2010, was arrested again on Friday after she reportedly refused to testify in front of a Virginia grand jury about her interactions with WikiLeaks and its founder Julian Assange.

"I've found you in contempt," Judge Claude M. Hilton told Manning at the public ruling, according to the Washington Post. He said Manning will be jailed until "either until you purge yourself or the end of the life of the grand jury."

Manning said in a statement on Twitter that she was summoned to appear before a secret grand jury on Wednesday. In response to each question, she said she answered: "I object to the question and refuse to answer on the grounds that the question is in violation of my First, Fourth, and Sixth Amendment, and other statutory rights."

"All of the substantive questions pertained to my disclosures of information to the public in 2010 — answers I provided in extensive testimony, during my court-martial in 2013," her statement continued.

In January, WikiLeaks alleged that federal prosecutors were working to get witnesses to testify against Assange in secret criminal proceedings being conducted by the Trump administration.

Read more: US prosecutors press witnesses to testify against Assange: WikiLeaks

Before the ruling, Manning told reporters, "I don't believe in the grand jury process; I don't believe in the secrecy of this."

Manning's lawyer Moira Meltzer-Cohen called the arrest an "an act of tremendous cruelty," according to The Post.

Manning was imprisoned for 7 years out of a 35-year sentence stemming from multiple counts under the Espionage Act. In 2017, she was released after President Barack Obama commuted her sentence late in his term.

Manning has said she suffered from mental health issues in prison, where she attempted to commit suicide twice. During her incarceration, she spoke out about her treatment in the justice system as a transgender woman. Throughout her sentence, she was housed in a men's prison despite undergoing hormone and speech therapy as part of her transition.

Meltzer-Cohen commended prosecutors in the current case for working to address Manning's medical needs, and Hilton said the court was available if US Marshals failed to address them, according to The Post.

Join the conversation about this story »

NOW WATCH: What El Chapo is really like, according to the wife of one his closest henchman



source https://www.businessinsider.com/chelsea-manning-arrested-refused-to-testify-in-wikileaks-case-2019-3

Thursday, March 7, 2019

Mark Zuckerberg is rumored to have a secret escape passageway beneath his conference room for emergencies (FB)

Car bomb fears and stolen prototypes: Inside Facebook's efforts to protect its 80,000 workers across the globe (FB)

facebook security 2x1

  • Facebook has a 6,000-person security army quietly protecting its tens of thousands of employees around the world.
  • The challenges they face are immense — from stalkers to stolen prototypes, car bomb fears, gang violence, and concerns about state-sponsored espionage.
  • Business Insider spoke to current and former Facebook employees about the wild hidden world of Silicon Valley corporate security.
  • Thousands of people turn up at Facebook's offices every week to complain about their accounts, attempt to sneak in, ask for tours, or try to meet CEO Mark Zuckerberg.
  • Defenses range from plain-clothes officers with firearms to location-tracking of blacklisted people — and there are even rumors of a secret escape passageway.

When a disgruntled YouTube user opened fire with a semi-automatic pistol at the company's California headquarters in April 2018, injuring three, the gunshots reverberated across Silicon Valley.

At Facebook, just a 30-minute drive away, the company sprang into action and quietly redoubled its own defenses. The Menlo Park-based social networking firm drastically upped the number of off-duty police officers that covertly patrol its halls in civilian clothes with concealed firearms. Few employees even know these officers exist, and the move spooked some of the workers that subsequently noticed them.

And it spent around $1 million to bolster its vehicle fleet with more than 30 new Toyota RAV4 hybrid SUVs for its security organization to patrol its Bay Area offices with — only to leave them sitting in a garage for months, unused, as the company deliberated about how they should be branded. (It's not clear if they're now in action or not.)

If it sounds like a small army, that's because in many ways, it is. 

Silicon Valley's founding principles of freedom and non-conformism created a province of open-plan offices and sprawling, university-like campuses that have since been emulated throughout the corporate world.

But within Silicon Valley's tech companies today, there's a more hardheaded reality hiding just below this idyllic surface. At a time when tech brands and leaders have become objects of public fascination, and in some cases, outright hostility, and in the wake of the YouTube shooting, tech companies like Facebook have no choice but to erect ever-more sophisticated, and expensive fortifications.

For shareholders, this means shouldering ever heavier costs, often tens of millions of dollars, for the protection of top company executives and facilities security. Within Facebook, it means empowering a 6,000-person shadow workforce whose day-to-day experiences provide a revealing window into another side of Silicon Valley, far removed from app marketing plans and machine learning conferences: A secret world of stalkers, stolen prototypes, car bomb fears, earthquake contingency plans, gang violence, and concerns about state-sponsored espionage.

Business Insider spoke to current and former workers in Facebook's security organisation and others familiar with the matter, obtained internal company documents, reviewed court documents, and surveyed publicly available information about how the company handles its security. 

These sources described sophisticated logistical challenges in protecting tens of thousands of employees and contract workers every day — and an underlying tension between the techie ideals of openness and engineer freedom and the realities of protecting a high-profile and increasingly controversial multinational firm. 

"As a security guy, you can buy Fort Knox tomorrow, but that's not going to fly in a tech environment," said a former member of Facebook's security team. "[So] you create policies and barriers and processes so you're the friendliest you can be while as safe as you can be." (Sources were granted anonymity as they weren't authorized to speak publicly about their experiences.)

Some of what Facebook's security team faces is prosaic, day-to-day issues, the kind you'd find at any major company: Petty thefts, car accidents, medical emergencies, and so on. But Facebook's unprecedented impact on civil society and billions of people's daily lives around the world means it also faces one-of-a-kind security challenges. People swarm to Facebook’s offices by the thousands — whether that’s to try to look around, attempt to give unsolicited pitches to company executives, or air their grievances.

And then there's one of the most important challenges of all: Protecting Mark Zuckerberg.

facebook security car

Protecting the principal 

When CEO Mark Zuckerberg first got 24/7 executive protection, there was a problem: He kept wandering off.

Sources said that in the early 2010s, the world-famous Facebook cofounder didn't always keep the team — initially just one person — in the loop on his plans. He might decide on a whim to leave the office, or go for a jog, or to a bar, leaving his security staff scrambling to keep up. 

"He [was] in his mid-twenties ... he was developing a platform he truly believed was good ... at the time he didn't grasp the concept that there were haters out there," one source said.

Since then, however, Zuckerberg has grown more accepting of executive protection's constant presence, according to insiders. His closely monitored patterns of life now far more closely resemble a head of state than a typical 34-year-old engineer, with the stricter security practices mirroring the increase in Facebook's own fortifications over the years.

Armed executive protection officers stand on constant guard outside his gated homes in the Bay Area, at least one of which also features a panic room. If he goes to a bar, his team will sweep through ahead of time to make sure it's safe. They will vet new any new doctors, or trainers if he wants to take up a new hobby. He is driven everywhere, with the security team monitoring traffic and adjusting his route accordingly. (Back when he still drove, Zuckerberg was, in the words of one source, a "shitty driver.")

During company all-hands meetings, members of Zuckerberg's Praetorian Guard sit at the front of the room and are dotted throughout the crowd, just in case an employee tries to rush him. They wear civilian clothes to blend in with non-security employees.

Zuckerberg doesn't typically work in a cordoned-off office like a traditional corporate executive. Instead, his regular desk is on the floor of Facebook's open-plan office, just like everyone one — but executive protection officers sit near his desk while he works, in case of security threats. Facebook's offices are built above an employee parking lot, but it's impossible to park directly beneath Zuckerberg's desk, because of concerns about the risk of car bombs.

He also has access to a large glass-walled conference room in the middle of the space near his desk, which features bullet-resistant windows and a panic button. There's also a persistent rumor among Facebook employees that he has a secret "panic chute" his team can evacuate him down to get him out of the office in a hurry. The truth of this matter remains murky: One source said they had been briefed about the existence of a top-secret exit route through the floor of the conference room into the parking garage, but others said they had no knowledge of it. Facebook declined to comment on the rumor.

facebook zuckerberg guards

All told, there are now more than 70 people on the executive protection team at Facebook, led by former US Secret Service special agent Jill Leavens Jones. In July 2018, Facebook's board approved a $10 million security allowance for Zuckerberg and his family for the year.

And with good reason: The billionaire chief exec lives an extraordinarily public life, with 118 million followers on Facebook alone (making him both an icon of Facebook's ideals and, increasingly, a magnet for public ire following his company's recent scandals), and the threats he faces are severe.

He receives numerous of death threats a week, and the security team actively monitors social media for mentions of him and COO Sheryl Sandberg. The pair also have stalkers, who alternately declare their undying love for the execs or harbor worrying vendettas against them.

Zuckerberg and Sandberg are the only two Facebook execs with 24/7 executive protection, though others may get it for specific occasions like traveling. The pair also have amusing security codenames, which Business Insider is not publishing for security reasons. 

The CEO has been forced to get restraining orders against people obsessively following and trying to contact him in multiple instances. In one notable incident in 2015, a local, William Gordon Kinzer, repeatedly turned up outside Zuckerberg's house over a period of weeks and aggressively harassed the security officers, according to court documents. "On May 30, 2015, at approximately 9:39 a.m., I was seated in my car … Kinzer stopped at the passenger side of my window, looked directly at me and yelled loudly, 'Stay in your car like a good little monkey and obey the law,'" one security officer testified. "Kinzer then turned and walked away. Kinzer appeared angry and aggressive. I was concerned for my safety."

Facebook COO Sheryl Sandberg was once stalked by an employee who sent her a barrage of messages. Even after the employee was fired and blacklisted, she would still show up at campus occasionally, a source said. (Facebook declined to comment on this, any many of the other incidents detailed in this story.) Such stalkers are classified as "BOLOs," short for Be On the Look Out, a category of person banned from all Facebook property. If BOLOs use Facebook or the other apps the company owns, the security team may quietly use data drawn from these apps to monitor their location without telling them, as CNBC previously reported.

In one surreal episode, someone turned up outside Zuckerberg’s house with a love letter scrawled across the side of their truck, a source recalled. Security officers initially assumed it was directed at the CEO — but it was actually for the benefit of one of the housekeeping staff.

Pranks and political stunts are another concern: High-profile execs make prime targets, as Microsoft cofounder Bill Gates infamously discovered when he had a pie thrown in his face in Brussels in 1998. Any time Zuckerberg goes out in public, there are concerns he could be mobbed, and his appearances at events are carefully planned and mapped out in advance.

People will also send unsolicited presents to his home — everything from cookies to a gift from a rabbi after the birth of one of his children. (These get sent to the security team for inspection; Zuckerberg doesn't open them himself.)

In Facebook's offices, things are less intense, but employees will still rush to get the seats at meetings closest to Zuckerberg. Executive protection officers are instructed to be alert for employees and guests at the offices trying to take unauthorized photos of Zuckerberg, which is against the rules. Some employees, too, will try and give him gifts.

facebook stairwell and carpark

'Move fast and break things' isn't always the best approach to security

Today, Facebook has 40,000 full-time employees — but its total workforce is far higher.

More than 80,000 personnel across the globe (including contractors and contingent workers who don't necessarily get the same benefits as full-time employees) fall under the protection of the Global Security team's protection, across 160-plus facilities ranging from engineering offices to data centers to content moderation centres, in more than 100 countries across the globe.

To handle this, the company has a literal army of security officers.

There are more than 6,000 people working in Global Security (500 of those are full-time employees; the rest are contractors and contingent workers), with more than 1,000 security officers working at the Bay Area officers alone — patrolling on foot, in vehicles, with sniffer dogs, and on bikes ("Fox Units"). By way of context, Snapchat parent company Snap has only 3,000 employees total. Twitter has just under 4,000.

Among the third-party contractors it leans heavily on to provide security officers and intelligence analysts for its workforce are Allied Universal, G4S, and Pinkerton. Facebook also funds a Menlo Park Police Department substation near its offices, and works closely with local law enforcement and emergency services.

There are five key strands to Facebook's security efforts. Most visibly, there's Global Security Services, Facebook's legions of security officers ("blue shirts") and its global security operations centres (more on those later). And there's Global Security Intelligence and Investigations, which handles, as the name suggests, investigations and studying streams of intelligence. 

Then there is Global Security Strategic Initiatives, that looks at risks as the business grows (is this a high risk area for expansion? Is building here really a good idea? And so on); Systems and Technology (think keycards, security cameras, and the software that keeps it all humming along); and, of course, the Executive Protection team.

Like the rest of Facebook, Global Security is a ravenous consumer of data, slurping up vast streams of intelligence, which range from from open source information to third-party data streams, from media reports about breaking news events to dark web marketplaces that might be selling the company's intellectual property — and, of course, users' posts on Facebook itself.

It's an "intelligence-based organisation," trying to sift through a flood of noise to identify and mitigate potential issues ahead of time, and it identifies millions of "threats" to the workforce every year, from natural disasters to threats of violence against employees, of varying levels of credibility.

facebook reception desk 2

Atop it all sits Nick Lovrien, a former CIA counterintelligence officer who serves as Facebook's chief global security officer. Lovrien, who worked to tackle foreign fighter pipelines in in the Middle East, credits the early-2010s upheaval in the region as opening his eyes to Facebook's capabilities.

"I was in Iraq ... we were doing missions, three, four a night, trying to cut [the foreign fighter pipeline] off and during this time ... it was the start of the Arab Uprising, and [I] saw the power of social media," he told Business Insider in an interview.

(Lovrien in turn reports to John Tenanes, Facebook's vice president of culinary, facilities, and security, who reports to CFO David Wehner.)

"[Facebook] is the critical infrastructure for modern-day democracy, and that's why we're so focused on the integrity of the platform, the safety and security of that platform. What that does is bring unique risks to Facebook as well," Lovrien said.

In short: Protecting Facebook is a monumental task — and not always one that's been made easier by the company's internal philosophy.

Though it has moved away from it in recent years, Facebook was historically famous for its motto of "move fast and break things." The company emphasized speed and initiative; if something didn't quite work out, it could always be fixed later. But while this attitude might work effectively for developing apps, it doesn't fly in the rigid world of physical security, multiple sources said.

When Facebook built its new headquarters, some of its entrance points had to be locked up after the team realised they posed a security risk, allowing people to bypass the checkpoints at the main reception desks, a source said. Security projects could become derailed because an engineer didn't like some aspect of it. Across the company, different teams took very different approaches to handling investigations, hiring people with varying levels of experience and qualifications (Facebook says it is "intentional about hiring people from non-conventional backgrounds" in addition to hiring traditional security professionals).

"I know Facebook's culture is we’re all friends and there’s no friction … the reality is sometimes security requires a certain amount of friction," one source said.

Lovrien conceded this was the case, but said Facebook has since evolved. "I think that's an accurate statement in Facebook six years ago, when I first started," he said. "Over the last six years we've really focused on taking those [old] programs offline and introducing new security systems."

Since then, Lovrien said, "I’ve been able to hire the strongest leaders that are out there, and the level of expertise that we have is just not found in any other corporation, so [I'm] very proud of the teams that are here."

In recent months Facebook has been faced with some allegations of racism in its workplace, stemming from an open letter shared by a former employee, Mark Luckie. Two former security officers also said they saw discrimination at the company.

"I'll give you a rundown — Black guards being given the shit posts. Blacks guards being passed over for promotions. Incidents where white drivers were given leeway in an accident when Blacks under similar situations were strictly penalized. Uneven discipline regarding hair color and visible tattoos," one said.

Facebook says it sets clear guidelines for contracting firms it works with and jointly investigates any such allegations. Reached for comment, Allied Universal, which provides security officers for Facebook in the Bay Area, said it "is committed to diversity and fostering an inclusive work environment. Our goal is to represent the many and diverse communities that we take pride in serving because a diverse population of security officers creates safer environments and stronger communities. To this end, we have comprehensive standards of conduct and a zero-tolerance policy for discrimination, retaliation or harassment of any kind. At all organizational levels, we actively promote an inclusive culture to help expand opportunity for all in the communities that we help safeguard."

In August 2018, Facebook's security officers negotiated a union contract. However, sources say some officers remain unhappy with the concessions it secured. And hiring new security officers can also be difficult, due to ongoing low unemployment rate in the United States — though that's not unique to Facebook. 

facebook gates

Facebook has its hands full keeping the masses out

Another key challenge for Facebook: Managing guests, and keeping out people who aren't supposed to be there.

The sheer scale of the number of people coming through Facebook's doors is staggering: In June 2018, for example, the company had 140,000 invited guests globally, not including employees themselves — from job applicants to business meeting attendees and friends of employees. (Nearly 54,000 of these visitors were at Menlo Park alone.) It had 1.5 million across the entire year.

But uninvited visitors also swarm to Facebook in astonishing numbers. The company has to turn away around 1,000 people from its offices every week (classified as "visitor turnaways, or VTAs): Sightseers, people hoping to pitch the company on business proposals, and so on. And there's a steady stream of angry users and protesters who come to cause a fuss.

Facebook's security team sees dozens of "incidents" a day, which range from people angrily demanding to know why their accounts have been banned to internal issues like staff injuries requiring medical attention. If someone uninvited is hostile, they may be made a BOLO. Some individuals are also classified as a Person Of Interest (POI).

Facebook would not say directly whether a journalist has ever been made a BOLO, or if the company has ever accessed the location data or other personal information of a journalist (whether a BOLO or not) as part of an investigation. "No person would be subject to the above-mentioned procedures without credible cause.  A person — whether a journalist or not — would only be added to a list following an assessment that they constitute a credible threat to Facebook or its staff," spokesperson Anthony Harrison said in an email.

"Our physical security team exists to keep Facebook staff safe. They use industry-standard measures to assess and address credible threats of violence against our staff and our company and refer these threats to law enforcement when necessary. We have strict processes designed to protect people's privacy and adhere to applicable laws and regulations. Any suggestion our onsite physical security team has overstepped is absolutely false," Harrison continued.

Business Insider previously obtained 911 call records from Facebook's campus, which provided insight into the kind of extreme incidents that can occur: A mace attack on a security guard, a user who had been scammed after being told he'd "won the Facebook lottery," an angry confrontation over a "non-injury accident," and so on. But only a tiny fraction of incidents are severe enough to reach the point where 911 is called; the overwhelming majority are handled in-house. In April 2018, for example, there were more than 2,000 "incidents" at Facebook's offices around the globe — 124 of which were medical incidents.

In one notable incident in London in 2017, YouTubers were able to sneak into Facebook’s offices in the city and helped themselves to the free food and candy, subsequently making a video about their experiences.  As a result, "when those individuals traveled to the US, we upstaffed and made sure every officer was aware of what they looked like in case they tried to access our buildings while they were here," a source said.

At least one person has managed to sneak past security in an effort to pitch Mark Zuckerberg on an idea, and was only discovered after being noticed asking other employees for directions to the CEO’s desk. Another time, an outsider was turned away multiple times after lying about a meeting, only to be let in via a side-door by an unwitting employee heading for lunch, a source said. The infiltrator picked up a Facebook-branded t-shirt to blend in, and was only discovered when they tried to survey Facebook employees.

facebook security parking lot

Controversy swirling around Chinese tech giant Huawei means concerns about corporate- and state-sponsored espionage have been headline news in recent weeks. Facebook has never detected anyone infiltrating the company to steal intellectual property or for political reasons, Lovrien said, but it is an issue that the security team actively worries about, and it has put counter-measures in place to try and "mitigate those potential risks."

And in December 2018, Facebook temporarily evacuated its headquarters after a bomb threat came in targeting the office. No-one was hurt, and no device was found. Lovrien declined to provide more information on the incident. 

There will also occasionally be unauthorized drone fly-overs, as pilots try to get a glimpse of what's taking place inside Facebook's hallowed walls.

Of course, the majority of activity isn't malicious. Tourists also flock by the busload to the campus of Facebook — and other Silicon Valley firms — to try and get a glimpse of the world-famous companies or just get a photo next to the iconic thumbs up sign, adding to the deluge of visitors the security team has to keep track of. ("99% of [visitor turnaways] is primarily tourists," said Lovrien.)

The company employs technological solutions to help them with all this. It utilizes license-plate scanners to check the vehicles of visitors, and see if they’re on any blacklists or belong to BOLOs — something that has helped identify stalkers prowling the grounds. And the company has explored using facial recognition cameras to monitor who’s coming and going, but says the tech hasn't been implemented.

There's also a Red Team, a "penetration testing" unit in the organisation that tries to break into the company's facilities in creative ways to test its defenses and keep security on its toes. Execs will sometimes to enlisted to help with these tests, swapping entry badges and attempting to gain access as someone else. (Facebook's security officers are provided with photos of the company's leadership so they can learn their faces, in much the same way lists and images of of BOLOs circulate in preparation ahead of events.)

For the worst-case scenarios Facebook also has its off-duty officers armed with firearms, though their very existence remains unknown to many employees. 

facebook reception desk 1

Facebook's security nerve center needs to keep tabs on 80,000 people

In November 2015, when terrorists attacked the Bataclan theatre and other sites across Paris, France, Facebook's GSOC sprang into action.

The GSOC — short for the Global Security Operations Center — is the nerve center of the social network's physical security infrastructure, monitoring threats, managing issues, and analyzing reams of data. A large room with dozens of computer stations and screens on the wall, it keeps tabs on all its employees' overseas travel, and as the attack unfolded the team quickly worked to assemble data on Facebook employees in the area, to see if they were in harm's way, and asking them to check in with notification software Everbridge.

No Facebook employees were ultimately harmed in the attack, but it highlighted the GSOC's role as a key node in Facebook's efforts to keep its employees safe and secure, especially in times of crisis.

Open 24/7, the GSOC also employs its monitoring capabilities closer to home — keeping tabs on everything from video feeds of Mark Zuckerberg's home to local shootings or incidents that could potentially impact Facebook employees in the area. One of the most significant day-to-day challenges it handles, Lovrien said, is issues caused by the weather — pointing to the recent deadly tornadoes in Alabama and the need to protect employees and facilities from them as a recent extreme example.

GSOC also has three outposts elsewhere in the world to provide round-the-clock coverage: one in London, England to cover EMEA;  an Asia-Pacific base in Singapore; and a third in São Paulo, Brazil for Latin America. And it produces the "Daily Brief," a regular intelligence document that collates recent security issues, potential emerging issues, employees in high risk locations, and other data points for company leadership. (Some investigations and research are also conducted by GSII, Global Security Intelligence and Investigations.)

facebook GSOC

It also handles some Facebook user-focused features. It helps run Safety Check, Facebook's feature that lets users mark themselves as safe to their friends after terror attacks, natural disasters, and other crises — including the Paris attacks in 2015 — as well as the AMBER alerts that go out on Facebook to help locate missing children, and Facebook's blood donation tool. There were more than 690 Safety Check activations throughout 2018, with more than 37 million users marking themselves safe as a result.

Global Security has extensive plans and best practices put in place for various possible security incidents. Executive kidnapped? Notify law enforcement, get proof-of-life, contact the kidnap and ransom insurance company, and go from there. Active shooter? Gather critical information about the location and description of the shooter, call local law enforcement, send out emergency notifications, lock down or evacuate the buildings as necessary, and so on.

Unexpected package sent to an exec's house? Get information about who dropped it off, make an incident alert, and send the package to the GSII without opening it. Media turned up outside Zuckerberg's residence? Figure out who they are, why they're there, send a mobile unit to meet them, and notify police if requested by management or the executive protection team.

Protocols like these are by no means unique to Facebook; they provide a clear agreed-upon framework to follow in times of crises. But they're indicative of the disparate challenges Facebook now faces in protecting its global workforce, from civil disturbances to safely handling the firing of "high-risk employees."

Facebook has to similarly prepare whenever it constructs a new facility: When it built its new Frank Gehry-designed headquarters in Menlo Park, the security threats it was forced to consider involved everything from the risk of earthquakes to the possibility of a plane from San Francisco International Airport falling out of the sky onto the campus, causing carnage. 

Thefts, fights, after-hours trysts: The challenges of managing Facebook's workforce

And in a organization as large as Facebook, whose tens of thousands of employees rival the population of a small city, maintaining order means both protecting the perimeter from outside dangers and staying on top of inside threats.

When numerous employees' headphones were disappearing a couple of years ago, the company installed a covert mobile camera to monitor desks, a source said. The sting operation caught an employee stealing them to sell online. A Facebook spokesperson said items are sometimes misplaced during office moves, and then misreported as thefts.

But Silicon Valley's tradition of openness can complicate things, such as the time when an old prototype of an Oculus virtual reality headset was stolen from a conference room. Facebook — like many companies — doesn't have surveillance cameras inside its offices, and the enormous, open-plan design of the office meant that the pool of suspects would likely be hundreds of people, with no way to narrow it down. There was nothing security could do; the prototype was never recovered.

"The business has identified that we really need that open office environment that promotes our collaboration, and so that's the risk we're willing to accept inside an office is that open office environment," Lovrien said about Facebook's approach to openness. "So what we then look at is how we mitigate that risk," from proactively sifting through intelligence to putting physical checkpoints in place and manning the perimeter of the offices.

Facebook also provides employees with access to free vending machines that provide spare charging cables, headphones, computer mice, and other items — which can be another source of thefts. (Lovrien said these thefts are rare.)

facebook bikes

Employees sometimes try to use video-chat apps to give their friends virtual tours of the office, which is against the rules. And at least one employee was caught letting in tourists who wanted to take unauthorized tours of the facilities.

The fact that the office is open 24/7 also means there can be NSFW incidents: Employees are caught having sex in the offices about once every three months, on average. (HR may be alerted, but the couple aren't typically fired.) On the other end of the spectrum, domestic disputes can have workplace consequences: At least one couple working at Facebook had a restraining order between them, forcing the two to work at different locations.

There's one persistent problem that plagues security teams at companies around the world that is almost completely absent at Facebook: Lunch thefts. That's because Facebook provides an extensive selection of free lunches and snacks for all its workers.

Still, even cafeterias with free meals can have problems.

In August 2013, after Facebook's beloved head chef died in a motorcycle crash, the company threw a blow-out party with free booze on a weekend to commemorate him. The memorial descended into chaos, with multiple fights breaking out among kitchen staff, which security staff believed were gang-related. The event culminated in one kitchen worker being beaten so badly on Facebook grounds they were hospitalised.

The assailant was subsequently blacklisted — but he continued to sneak onto campus afterwards to visit his mother who still worked there.


Do you work at Facebook? Contact this reporter via Signal or WhatsApp at +1 (650) 636-6268 using a non-work phone, email at rprice@businessinsider.com, Telegram or WeChat at robaeprice, or Twitter DM at @robaeprice. (PR pitches by email only, please.) You can also contact Business Insider securely via SecureDrop.

Join the conversation about this story »

NOW WATCH: Everything we know about Samsung’s foldable phone



source https://www.businessinsider.com/inside-facebook-physical-security-protect-mark-zuckerberg-employees-2019-2