Subject Matter Expert, Inc.

Archive for the ‘IT’ Category

Framed for child porn _ by a PC virus

In IT, SME INC on November 10, 2009 at 2:00 pm

*Disclaimer: The details in this story are somewhat reprehensible, but true. I in no way, shape, or form condone the actions specified in this AP Story, but these are true accounts; people have had child porn appear on their pc’s after getting infected with a virus.*

Link to Ap story: HERE

Framed for child porn _ by a PC virus

By JORDAN ROBERTSON (AP) – 2 days ago

Of all the sinister things that Internet viruses do, this might be the worst: They can make you an unsuspecting collector of child pornography.

Heinous pictures and videos can be deposited on computers by viruses — the malicious programs better known for swiping your credit card numbers. In this twist, it’s your reputation that’s stolen.

Pedophiles can exploit virus-infected PCs to remotely store and view their stash without fear they’ll get caught. Pranksters or someone trying to frame you can tap viruses to make it appear that you surf illegal Web sites.

Whatever the motivation, you get child porn on your computer — and might not realize it until police knock at your door.

An Associated Press investigation found cases in which innocent people have been branded as pedophiles after their co-workers or loved ones stumbled upon child porn placed on a PC through a virus. It can cost victims hundreds of thousands of dollars to prove their innocence.

Their situations are complicated by the fact that actual pedophiles often blame viruses — a defense rightfully viewed with skepticism by law enforcement.

“It’s an example of the old `dog ate my homework’ excuse,” says Phil Malone, director of the Cyberlaw Clinic at Harvard’s Berkman Center for Internet & Society. “The problem is, sometimes the dog does eat your homework.”

The AP’s investigation included interviewing people who had been found with child porn on their computers. The AP reviewed court records and spoke to prosecutors, police and computer examiners.

One case involved Michael Fiola, a former investigator with the Massachusetts agency that oversees workers’ compensation.

In 2007, Fiola’s bosses became suspicious after the Internet bill for his state-issued laptop showed that he used 4 1/2 times more data than his colleagues. A technician found child porn in the PC folder that stores images viewed online.

Fiola was fired and charged with possession of child pornography, which carries up to five years in prison. He endured death threats, his car tires were slashed and he was shunned by friends.

Fiola and his wife fought the case, spending $250,000 on legal fees. They liquidated their savings, took a second mortgage and sold their car.

An inspection for his defense revealed the laptop was severely infected. It was programmed to visit as many as 40 child porn sites per minute — an inhuman feat. While Fiola and his wife were out to dinner one night, someone logged on to the computer and porn flowed in for an hour and a half.

Prosecutors performed another test and confirmed the defense findings. The charge was dropped — 11 months after it was filed.

The Fiolas say they have health problems from the stress of the case. They say they’ve talked to dozens of lawyers but can’t get one to sue the state, because of a cap on the amount they can recover.

“It ruined my life, my wife’s life and my family’s life,” he says.

The Massachusetts attorney general’s office, which charged Fiola, declined interview requests.

At any moment, about 20 million of the estimated 1 billion Internet-connected PCs worldwide are infected with viruses that could give hackers full control, according to security software maker F-Secure Corp. Computers often get infected when people open e-mail attachments from unknown sources or visit a malicious Web page.

Pedophiles can tap viruses in several ways. The simplest is to force someone else’s computer to surf child porn sites, collecting images along the way. Or a computer can be made into a warehouse for pictures and videos that can be viewed remotely when the PC is online.

“They’re kind of like locusts that descend on a cornfield: They eat up everything in sight and they move on to the next cornfield,” says Eric Goldman, academic director of the High Tech Law Institute at Santa Clara University. Goldman has represented Web companies that discovered child pornographers were abusing their legitimate services.

But pedophiles need not be involved: Child porn can land on a computer in a sick prank or an attempt to frame the PC’s owner.

In the first publicly known cases of individuals being victimized, two men in the United Kingdom were cleared in 2003 after viruses were shown to have been responsible for the child porn on their PCs.

In one case, an infected e-mail or pop-up ad poisoned a defense contractor’s PC and downloaded the offensive pictures.

In the other, a virus changed the home page on a man’s Web browser to display child porn, a discovery made by his 7-year-old daughter. The man spent more than a week in jail and three months in a halfway house, and lost custody of his daughter.

Chris Watts, a computer examiner in Britain, says he helped clear a hotel manager whose co-workers found child porn on the PC they shared with him.

Watts found that while surfing the Internet for ways to play computer games without paying for them, the manager had visited a site for pirated software. It redirected visitors to child porn sites if they were inactive for a certain period.

In all these cases, the central evidence wasn’t in dispute: Pornography was on a computer. But proving how it got there was difficult.

Tami Loehrs, who inspected Fiola’s computer, recalls a case in Arizona in which a computer was so “extensively infected” that it would be “virtually impossible” to prove what an indictment alleged: that a 16-year-old who used the PC had uploaded child pornography to a Yahoo group.

Prosecutors dropped the charge and let the boy plead guilty to a separate crime that kept him out of jail, though they say they did it only because of his age and lack of a criminal record.

Many prosecutors say blaming a computer virus for child porn is a new version of an old ploy.

“We call it the SODDI defense: Some Other Dude Did It,” says James Anderson, a federal prosecutor in Wyoming.

However, forensic examiners say it would be hard for a pedophile to get away with his crime by using a bogus virus defense.

“I personally would feel more comfortable investing my retirement in the lottery before trying to defend myself with that,” says forensics specialist Jeff Fischbach.

Even careful child porn collectors tend to leave incriminating e-mails, DVDs or other clues. Virus defenses are no match for such evidence, says Damon King, trial attorney for the U.S. Justice Department’s Child Exploitation and Obscenity Section.

But while the virus defense does not appear to be letting real pedophiles out of trouble, there have been cases in which forensic examiners insist that legitimate claims did not get completely aired.

Loehrs points to Ned Solon of Casper, Wyo., who is serving six years for child porn found in a folder used by a file-sharing program on his computer.

Solon admits he used the program to download video games and adult porn — but not child porn. So what could explain that material?

Loehrs testified that Solon’s antivirus software wasn’t working properly and appeared to have shut off for long stretches, a sign of an infection. She found no evidence the five child porn videos on Solon’s computer had been viewed or downloaded fully. The porn was in a folder the file-sharing program labeled as “incomplete” because the downloads were canceled or generated an error.

This defense was curtailed, however, when Loehrs ended her investigation in a dispute with the judge over her fees. Computer exams can cost tens of thousands of dollars. Defendants can ask the courts to pay, but sometimes judges balk at the price. Although Loehrs stopped working for Solon, she argues he is innocent.

“I don’t think it was him, I really don’t,” Loehrs says. “There was too much evidence that it wasn’t him.”

The prosecution’s forensics expert, Randy Huff, maintains that Solon’s antivirus software was working properly. And he says he ran other antivirus programs on the computer and didn’t find an infection — although security experts say antivirus scans frequently miss things.

“He actually had a very clean computer compared to some of the other cases I do,” Huff says.

The jury took two hours to convict Solon.

“Everybody feels they’re innocent in prison. Nobody believes me because that’s what everybody says,” says Solon, whose case is being appealed. “All I know is I did not do it. I never put the stuff on there. I never saw the stuff on there. I can only hope that someday the truth will come out.”

But can it? It can be impossible to tell with certainty how a file got onto a PC.

“Computers are not to be trusted,” says Jeremiah Grossman, founder of WhiteHat Security Inc. He describes it as “painfully simple” to get a computer to download something the owner doesn’t want — whether it’s a program that displays ads or one that stores illegal pictures.

It’s possible, Grossman says, that more illicit material is waiting to be discovered.

“Just because it’s there doesn’t mean the person intended for it to be there — whatever it is, child porn included.”

Related articles

Official Windows 7 Review

In Geek Squad!, IT, SME INC on January 21, 2009 at 2:00 pm

Windows 7

As an MSDN member, I was immediately notified on my Burry (BlackBerry Bold) immediately on Jan 15th when PB/CR1 (Windows “7” release 7000) was available to me for testing purposes. My initial impression: DAMN!

I can emphatically report that everyone is in for a true treat when this new addition to the Windows product lineup is finally released by Redmond. Someone today asked me if this was “Mojave”… NOPE!

Mojave was actually a PR-blitz aimed at correcting most common mis-guided personal opinions of Vista – 7 accurately does this.

Streamlined Interface

Streamlined Interface

This version is called Windows 7 because it really is – Vista was 6. Here is a screen-shot of the cmd version (note that it says 6, because Vista is 6; 7 is really Vista streamlined. These minor discrepancies will be corrected in later releases.

Command Prompt

Command Prompt

I implore everyone to go pickup a copy of the latest PC Magazine and read more in-depth reviews of 7 – my initial impression is:

  • It’s fast – Uninstalling something that took 15 minutes with Vista took less than 5 with 7.
  • It’s beautiful – if one thinks Vista was a work of art, everyone’s in for a real treat with 7.
  • Everything that works with Vista will work with 7 – because it’s really a streamlined version of Vista.
  • It’s disk and memory foot-prints are much smaller: Ultimate’s ISO D/L size was 2.44 gb.
  • User Account Control is less annoying, it doesn’t come up for every little change like it does in Vista.

Oh and by the way – I’ve written this post with my tethered BOLD. 🙂

For a more in-depth review, I’ve included today’s Computerworld review:

So which is better suited for netbooks? For the mass consumer audience, there’s little doubt: Windows 7 is superior. Installing new software and updating existing software in Linux isn’t for the faint-hearted, and most people won’t be able to figure out how to do it. In addition, Windows 7 has eye candy and extra features that Linux lacks. Most people also won’t want to tackle the learning curve they’ll face when moving from Windows to Linux.

Beyond that, Microsoft will spend countless millions of marketing dollars pushing Windows 7, and you can bet a good portion of that will go toward promoting it on netbooks. Since no one company owns Linux, there won’t be any marketing muscle for Linux.

With all that being said, a Linux-based netbook should cost less than a Windows 7-based one. The operating system costs will be less, and depending on the version of Linux installed, may be zero. In addition, Linux can work with lighter-weight hardware than Windows 7, and so the hardware costs can be less as well.

So Linux won’t completely vanish on netbooks, but Linux netbooks will become a small niche, primarily for budget-conscious technically oriented users. Estimates are that right now, about 30% of netbooks ship with Linux on them. Expect that number to plummet when Windows 7 ships.


Superman to the rescue!

In Geek Squad!, IT, SME INC on October 2, 2008 at 10:33 am

David Archuleta – Crush

Superman!

Carter’s Motel and Mobile Village

2450 So. Ridgewood Ave.

Edgewater, Florida 32141

To whomever may be reading this:

Randy is a computer wizard, and I do not take that term lightly.

As a small business owner that includes a motel, R.V. park, and mobile home village I saw an increasing need to move into the 21st century – the computer age. We needed to provide WIFI to our whole property of over five acres, and most importantly our motel and cottage guests. I contacted one of the two national computer home service companies who work out of major electronic chain stores: Fire Dog – after finding no one in the local area had the knowledge to install a central WIFI hub with an access point and antenna.

It took them several months to debug the system after the install. This clearly was the first time the technician had ever done such an install. This fella had little – (if any) idea how to make this happen but I had no choice but to use him. The cost of the equipment wasn’t so much as the loss of business and my time dealing with people who claimed to have the knowledge they did not. They finally got the WIFI system up and running after replacing the router three times!

I then started having trouble with my PC. I got tired of both constantly being put on perpetual hold when I called and the incompetent technicians at Fire Dog who seldom fixed my PC problems. I switched to the only other company that would come to my business: The Geek Squad, the other national home computer repair service, as I could not be with out my personal computer.

They also have a central call center. They will not allow you to call the local store to set up an appointment. I would be put on hold by a computer answering service, and then after ten to fifteen minutes a person would answer. I would give them all my info & tell them all my woes, only to then find out they were only screeners and not techs. They would then put me on hold again – another twenty to thirty minutes. Finally a supposed tech would answer, and make me repeat all of it all over again. This person also was not a tech, but would schedule an appointment one to two weeks out (unless I was willing to pay an additional $69 for a priority appointment). They also required I allow them to pre-charge my credit card for about $400 if I wanted a tech at all. If the tech did not use the total amount, they would charge back the difference (which didn’t happen often). I became completely disgusted and disheartened by the constant recalling, and paying the national chain – supposed computer experts. I begged The Geek Squad for a remote service, but they told me there was no such thing.

I have been taken advantage of several times by not knowing all the possible ways of con men. I had a fly by night web page salesman rebuild our motel/RV/mobile home village web page, after being “BLUE-SKYED”. He told me how our current page was lacking of “KEY” words and not coming up in search engines etc… I paid this man well over $1200. He never fixed the initial problems with the page: like the pricing of a one night stay in a cottage being listed as “$550.00”, instead of $55.00 per night. He seldom returned my e-mails or calls in the first four months and never fixed the problems; after words, he did not respond at all. When it came time to renew the year’s contract, he came asking for $279. I had paid him an additional $300 to start building an additional web page, other than our motel web site a year earlier; which he never did. I pulled and showed him the canceled check, and requested he accept the money I already paid him for the next year’s renewal. He agreed and left.

As if God Himself saw what was happening; he sent his helper; dare I say Angel?

Randy had stopped and stayed in our motel late one night, on his way north through Florida. The next morning he discovered we had an encrypted WIFI system, and asked for the key. He discovered after getting on line that our site was gone.

We were shocked to say the least. Unbeknownst to me, the web page salesman promptly pulled our web page after my refusing to allow him to milk us for an additional $279. I was aghast; I had no idea if we even owned our web address. I thought we were sunk.

Superman to the rescue!

Randy quickly determined that we owned our web site, thanks to our first web page designer – not the fly by night thief. She had registered our domain in my name, thank THE LORD, but her e-mail was still the administrative contact. Randy then gave me instructions on how to get our domain name switched to GoDaddy. I being ignorant of such things could barely follow the vast and technical knowledge that flowed effortlessly from his mind. Then he set things up so that I/we have full and direct control over our web site. I never thought I could ever actually build and maintain a site! He taught me more the short few hours we spent together, than all of the GEEK DUDES of the past, combined.

Randy did not have the time to stay to follow through with all he started to teach me, or get us set up to build and run our web page. “Faster than a Speeding Bullet,” Randy set up a remote access utility on my computer. He is now able to take full control of my computer from anywhere in the world (only at my behest of course) to fix, optimize, add/remove programs, spyware or viruses – or do whatever I need in a flash. He does this flawlessly with software that is non intrusive, and requires me to give him an encryption code before each session; otherwise he cannot access my computer at all. He does all this at a speed far beyond the normal person. This is not a joke.

For all intents and purposes, he really is “Superman.”

Peter Gordon Vice President

Carters Motel and Mobile Village

Edgewater, Florida

SME, Inc. Live Remote Support

In IT, Live Support on September 27, 2008 at 4:53 pm

After a couple weeks of internal debate, I’ve decided to offer nationwide remote support. Most people are familiar with GeekSquad, GeeksOnCall, etc. Have you ever tried to use these services? You have to call, wait on hold, describe your problem, get transferred or accidentally hung up on several times, then you have a $400 charge on your credit card – all before your appointment is even scheduled for a few days later.

This isn’t really what I think of when I think customer satisfaction. My business model is different. Anyone is able to email me, which is instantly delivered on my Moto G Stylus.

I prefer to be contacted on WhatsApp: 509-542-7620. An initial chat with a description of the issue would be best; once I’ve read and assessed what could be at issue, we’ll get on a voice call as I connect to your system/phone/mobile device. Note: since WhatsApp cannot be intercepted, it’s safe to leave any login credentials or Teamviewer ID #s for me, as nobody else can possibly receive them.

Be sure to include a brief description of the problem, as well your name and phone number where you can be immediately reached (include extension if applicable). I will return your call, get a better idea of what the issue is, and then send an e-bill. Paying is as easy as shopping online when you get to the payment screen; name, address, phone #, email, and credit card. Once payment has been sent please open my support window open and provide me with the ID number.

Begin SME, INC. Remote SupportBegin SME, INC. Remote Support

Begin SME, INC. Remote Support

COMMON MYTHS ABOUT REMOTE SUPPORT

  • “Remote support isn’t secure” – quite the contrary! I employ the use of an application called Teamviewer. This application is highly encrypted, and all communication sent and received from your computer is encrypted before leaving and decrypted after being received. This also means that even Teamviewer GmbH, the makers of Teamviewer cannot read the data stream between the provider and the computer remotely!
  • “Remote support is a back door to always get into my computer” – definitely not. That would be highly unethical and far to easily abused! THE CUSTOMER IS IN COMPLETE CONTROL AND CAN END THE SESSION AT ANY TIME. Furthermore, the session ID changes every time the application is opened, so once closed opening the application again would give you a new session ID which isn’t known until provided again.
  • “Well if remote support is so secure and controlled, why isn’t it used all the time?” – Actually remote support is used more frequently than on-site support in business to business support. The day when someone needs to be actually sitting in front of a computer to fix it is gone. Teamviewer is currently installed on over 10,000,000 computers and in use by IT professionals world-wide.
  • My last point is that some things may only be done remotely short of ripping a computer apart. I’ve seen instances that a computer was infected with multiple forms of Spyware and viruses. Sometimes these thing install fake firewalls to protect themselves by preventing the user from visiting certain sites (like known sites of Anti-Spyware programs. So, the only feasible way of getting around this is to use remote support – then the Anti-Spyware installation files can be transferred quickly and securely to the machine, installed, and the malware removed. The other option would involve a service call and either formatting and a complete OS reload or removing the hard drive, or copying the software onto the pc from a USB-flash drive. Both of these options would end up costing more in time and resources by the provider than remote support would.

If you like technical thing, I would suggest reading the whitepaper on Teamviewer to find out more information.

Another day, another project completed.

In IT, work on September 26, 2008 at 8:48 pm

It always feels great to complete a project knowing it was done ethically, completely, and everyone’s happy.

A couple of weeks ago when I was on my way back up to Virginia, I stopped @ Carter’s Motel & Mobile Village in Edgewater, FL. I really wish I could have spent more time there. It was such a relaxing atmosphere and even though I was only able to sleep an hour or two, I enjoyed every minute of it. If I hadn’t been in such a rush coming up here I would have loved to stay a couple of extra days with the Gordon’s.

Carter's Motel & Mobile Village

Who’d have thought calling the office asking for a WPA key would have led to what it did.

I would soon come to find out that not only did they have great ideas about the expansion of their business, but that their website was down. Why do people get greedy, and prey on people that they don’t think will know any better?! It gives honest service providers a bad rep, and it’s just plain not right. This fly-by-night idiot created a website for Carter’s Motel, charged them outrageous prices for “server hosting,” with a “discount per Rich” on a flimsy hand-written contract. Even though all monies had been paid, I soon discovered the guy took down their website. That’s just not cool!

If it were me, I’d track down the guy and sue him – not to be vindictive, but on principle alone. I suggested calling the police quietly if he ever came back to collect any more money for “services rendered.” Even though the police probably wouldn’t do anything about it as it’s a civil matter, they still have to complete an incident report. Every time police make an incident report no parties are allowed to leave until they have all pertinent personal information. Then all one would have to do is go down to the police station and obtain a copy of this report [under the freedom of information act] and they would have all his info. I searched public records and found only a P.O. Box in Tampa for this con artist!

What was done was done unfortunately, so I started back-tracking: hopefully this con artist didn’t have control over the domain name as well or the problem would be even worse. Luckily this wasn’t the case and I was able to transfer the domain to a reputable registrar, setup a completely free and feature rich Google Apps account, and configure all the DNS records to mesh perfectly with Google’s legendary service.

I’m proud to report that the site is back up and in the process of being re-designed – only this time under complete control of it’s owners at no cost beyond the initial technical hurdles required to get the services functioning smoothly. The entire system requires no technical knowledge by it’s owners, is secure, and has a huge reliable Internet Giant making sure everything always works!

It always brings such a smile to my face when I stop and take a moment to appreciate technology working perfectly – especially if it’s my work. I’m not conceited or arrogant, just happy that everything works and was done with honesty and INTEGRITY – which unfortunately is on the decline these days…

Narcissists at work: How to deal with arrogant, controlling, & manipulative bullies in the [IT] workplace.

In IT, work on September 24, 2008 at 1:22 pm

The following is a ComputerWorld article mom shared with me. All I could say is “WOW.” I’m going to leave it at that. I’ve experienced this personally before but I couldn’t really put my finger on what the problem was or how to effectively combat it. Hopefully this sheds some light on the subject.

clip_image001

Narcissists at work: How to deal with arrogant, controlling, manipulative bullies

Narcissistic employees — yes, IT has its fair share — can wreak havoc in the office and put your own job at risk.

Thomas Hoffman 06/12/2008 08:58:04

Five years ago, Jean Ritala was dating a businessman who started to demonstrate Jekyll and Hyde-like behavior. Well-spoken, charismatic and successful, he could also be manipulative and bullying, telling her that it was “his way or the highway.”

It wasn’t until someone told her she had been “stung by a narcissist” and shared books and Web sites with her on the topic that she fully appreciated what she had encountered. Now, Ritala, the IT support services manager at Mystic Lake Casino Hotel, educates and coaches others on how to deal with narcissists in the workplace.

Narcissism, defined as a personality disorder by the US National Institutes of Health, is a pattern of behaviors that show a pervasive need for attention and admiration, as well as a lack of concern or empathy for others.

In the workplace, says Ritala, narcissists tend to be successful and goal-oriented, with no concern for others who get in their way. They feel a need to control co-workers, projects and situations around them, and they can be manipulative, spinning situations and facts to make it appear that others around them are the problem, not them.

According to Ritala, narcissists often display the following traits at work:

  • Arrogant and self-centered, they expect special treatment and privileges.
  • They can be charismatic, articulate and funny.
  • They are likely to disrespect boundaries and the privacy of others.
  • They can be patronizing and critical of others but unwilling or unable to accept criticism or disagreement.
  • Likely to be anxiety-stricken or paranoid, they may exhibit violent, rage-like reactions when they can’t control a situation or their behaviors have been exposed.
  • They are apt to set others up for failure or pit co-workers against one another.
  • They can be cruel and abusive to some co-workers, often targeting one person at a time until he quits.
  • They may need an ongoing “narcissist supply” of people who they can easily manipulate and who will do whatever they suggest — including targeting a co-worker — without question.
  • They are often charming and innocent in front of managers.

As you might imagine, narcissists can be highly disruptive to a workplace, creating a traumatic environment with high turnover, Ritala says. Eventually the narcissist is caught in action enough times that he is fired, but this does nothing to change his behavior or protect the organization from other narcissists.

Recognizing the problem, Ritala, former president of the IT Service Management Forum – US, teamed up with management consulting partner Gerald Falkowski to write a booklet for IT managers called Narcissism in the Workplace (Red Swan Publishing USA, September 2007). She spoke recently with Computerworld‘s Thomas Hoffman about dealing with narcissism in IT organizations.

Does narcissism play out any differently within IT organizations versus other parts of a company?

IT is more competitive than some parts of the business, much like sales is competitive. I think you’re seeing it more now in IT because IT has become more focused on relationship-building and nurturing relationships. The types of behavior people turned their cheek to in the past, they’re now less willing to.

People are getting educated. Five years ago, fewer people knew about narcissism. Now there are online discussion groups that deal with the topic, such as the MSN newsgroup, and television shows such as Two and a Half Men featuring [the character] Charlie Harper as a narcissist. The dynamics of the workforce have changed, and narcissist personality-type employees or managers are standing out more than ever, creating more problems than their boss and HR can handle.


What happens if managers simply ignore narcissists’ disruptive behavior?

Often a narcissist remains in an organization for years, creating more and more workplace stress and turnover, due to their managers thinking their contributions outweigh their behaviors and denying and rationalizing the odd behaviors away. That is, until the next complaint comes their way and they continue to be forced to document the narcissist’s behaviors over time. They risk their own jobs by not taking action soon enough with each complaint or series of complaints.

The cost to organizations from narcissism in the workplace is staggering due to illness, stress medications and treatment, lack of teaming and project success, and rising turnover, until the narcissist or corporate bully is shown timely cause and effect from their negative behaviors.

What steps can IT managers take to address these issues?

You have to get educated with a health care professional like a psychologist who specializes in employee counseling services. Get them involved in reviewing the complaints to management and HR, and in helping others to understand these personality types, their behaviors and destructive impact to an organization.

Steps to deal with a narcissist personality type in the workplace include documenting what you observe and get complaints about, and not being afraid to go to HR and say, “This is what I’m seeing and this is what people are bringing to me.”

It often starts as a series of complaints to line managers, then to an HR representative. Once there are enough [complaints], they go to HR, and HR will implore a manager to document what they see as well as come and observe firsthand themselves.

How should managers approach narcissistic employees, particularly if an employee is unaware that he possesses these attributes?

Narcissistic employees should be encouraged by HR to see whatever company employee referral service is available to them, such as counseling, and you hope that the person will take advantage of that.

It depends on how enlightened the person is in terms of seeing how their behavior is impacting staff and their own performance. When you get manipulative, bullying and condescending types of comments and behavior, that’s what impacts performance and teamwork. That’s when you hope the narcissist person will take the encouragement to go seek help.

If they don’t, HR has to play back what [the narcissistic individual] did wrong using a calm approach. Establish firm boundaries with timely progressive consequences from the first complaint received. Follow up to see if behaviors appear to be improving or if they are getting worse. People’s behavior patterns typically don’t change unless they get help.

Up to one-third of a narcissist’s victims in the workplace will quit the company or transfer to another department if nothing is done by the department manager or HR to stop the situation. Once a narcissist’s behaviors are observed and documented, they can become even more cruel and offensive to others, as they no longer can hide their behaviors and rationalize them away or project their shortcomings onto others.

The key is observing, documenting and taking swift action each and every time so the narcissist knows their cruel behaviors will not be tolerated in the workplace.

I’ll miss you ALL!

In Geek Squad!, IT, work on September 10, 2008 at 2:47 pm

My boss and I have mutually decided to call it quits. I’m not going to get into the nitty-gritty here; the short and sweet is that it just wasn’t ever going to work. You are welcome to think what you want.

I’m moving back up to VA next week; I miss the cold of winter (I get hot far too easily), and nothing is keeping me in FL. I have no family or girlfriend here, but I do have great job prospects in VA. Liz and I are getting back together. I think it’s going to work for good this time, as she doesn’t drink anymore and has been putting me first since. I pledge the same to you baby – if all goes well in a yr or two, let’s have that kid. I’m not sure if the world is ready for another one of me, but hey: We’re not getting any younger, right?!

I will truly miss the people I’ve come to know well over the last few months. You probably know who you are, but if not – There are a handful of people @ Medsearch: Stephanie, Sherie, Shanna, Kelly, Big & Little, Seth, and of course Sam! You all have your individual talents, and nobody should change a thing! If you constantly conform to someone else’s expectations it will cost you dearly.

  • Stephanie: Don’t change a thing. Keep improving on your already almost impeccable photography. You’ll go far some day! Keep the heatr party pics coming, I enjoy talkin’ shop w/ ya!
  • Sherie: Get a few drinks in you, and go the heck over to Open Mike night @ Improv @ the Hard-Cock… I mean hard-rock and audition! You seriously are the next Wanda Sikes! You’re funny as hell, and I’m a touch critic! I love you because you tell it like it is, which often is why people don’t like me. Somehow you do it with more finesse than I do. 🙂 Your daughters will go far – keep bein tough on them, when you have an attorney and a recording artist I wanna be there. Both for the 1st record, as well as when the other one passes the bar. I’m sure she’ll be one of the most dangerous attorney’s around!
  • Shanna: Incredibly beautiful, and intellectually dangerous! Often the talk of the town, yet like me, everyone is 100% wrong about you! First impressions don’t even begin to come close. Everyone was waaaay off! This woman can mentally spar with me – which she did from day 1. I was impressed! I can’t say that about many women. Usually it’s beauty or brains. She has it all. Continue to do what you do, and ignore the talk. Every guy wants you, and every woman wants to be you. The messed up part is that nobody really knows the real you (except us select few) – and I’m proud to be one of them. Your boyfriend is exceedingly lucky. I hope he knows what a gem he has! You are an up-and-coming force that deserves respect. It’s time for the haters to stop hating and take you seriously.
  • Kelly – I don’t know what it is about you, but you’re not like the rest. You have an inner beauty that almost nobody notices. I hope you’re enjoying your Burry – take care of it, and it will always take care of you.
  • Nicole Smith: You’re such a wise woman, and one of the few that truly get me. Thanks for your words of wisdom, I’ve taken them to heart. If I can do anything for you, let me know. It has always been a pleasure working with you. I love talking to you; you have a way of putting everyone at ease like they are your best friend, yet you don’t miss even the smallest detail.
  • Nichole Meyer: keep doing what you do best! It can’t be easy handling Sam’s every little detail. I’m glad I don’t have as many details for Liz to keep up with!
  • Seth: You, are THE man! You should take a few videos sometime of you fishing for the big ones and send it into bassmasters – maybe one of these days I’ll be able to say “Yeah, I went fishin’ for Tuna with Seth – but that was before he was famous….” My dad would pay to go fishing with you. He goes up to Alaska and pays quite a pretty penny to go fishing; it would be much better spent with you. Bassmasters, watch out!

And last but most certainly not least (quite the opposite) Sam Karsch: You DA Man. That’s it. Your forte is business and sales. Your witty sense of humor is un-paralleled! Michael is one lucky kid, hopefully he picks up on your sense of humor. You get things done, and are loved by all – maybe one of these days I’ll be as quick as you with the jokes. Don’t change a thing Sam! One time Martha showed me the joke email you sent to her BlackBerry meant for your son. The one where you told him to make sure he used rubbers so he didn’t get any Jews pregnant, only drank the best beer, and only smoked pot – not any of the other drugs. I was nearly in tears as I was reading it – it was that funny! Martha had such a scowl on her face – “That is NOT funny! How can you call something vulgar like that funny?!” Seriously, if more people could take a joke and not take everything so seriously this world would be such a better place! Humor makes the bad not so bad anymore, and life bearable. It’s also a lot cheaper than all the alternatives (drugs, sex, alcohol, etc).

I already said goodbye to Ron over @ ISC; he wished me luck, and encouraged me to look up a movie called “Wrong Turn.” It was made in the same town his fiance is from in West Virgina. I’ll miss the non-stop slapstick comedy as I fix computers. I’ve never had so many laughs while working on a PC!

I don’t think anyone @ Alpine really knows what’s going on, except maybe Rick. I wish you all the best of luck over there – and hopefully you don’t need it! RL is one tough cookie to keep running! Maybe what Rick needs to do is promote Daniela and make her in-house IT in training?

LJ – good luck. Keep on Keepin’ on. You are seriously one effing hilarious dude! Make sure not to turn off your brain until after 5pm on Friday from now on – afterall it’s only you and Dean now. Never stop learning. The moment you do in this line of work you’re obsolete. Oh and when I told you not to delete the virus on the server you found I was joking! Leaving a few viruses around does not lead to a healthy server immune system! Always delete the viruses! Oh and your RDP on your iphone? Siiiiiick dude! One of the coolest toys I’ve ever seen. I’m gonna check out RDP app’s for my Burry soon.

I wish you all the best!

~Randy

PS – I welcome any and all comments. Appropriate comments will be immediately approved and posted. Hater comments will not, so please just save your breath! 🙂 This world has enough negativity as it is….