(Preface: This story is loosely based on real events and situations, and obviously I have elaborated in spots and of course changed all the names and other pieces of information that might give away the actual persons involved. I have taken several liberties to make the story more 'detailed' in places where I was not privy to actual events. Finally, I don't write this to scare or even warn anyone, but it will open some eyes to know what goes on in some businesses and just how non-private things like email, voice mail, and can be. )
--------------------------
My name is Craig and the company I worked for was just over a decade old, but it had been a decade of incredible growth, explosive product launches, and complete dominance of the niche market in which we competed. I had been hired about 7 years into the company's history, but I came in with a proven track record for network security and had authored several papers on protecting companies from hackers, viruses, and other malicious outsiders. However, it turns out I was being hired not to keep the rest of the world from getting into our systems, but more to keep our secrets and technologies from getting out.
The company had patented well over 15 biomedical breakthroughs in its short existence. It had made progress in several areas of research that had remained stagnant for years, and eventually caught the interest of several pharmaceutical giants, not to mention the US and British governments that sought answers to several military problems they faced when engaging countries with chemical and biological arsenals. The company had more value in its intellectual property and trade secrets than any other physical asset in its control.
The company now employed over 1900 employees in 6 regional offices throughout the US and England. High speed lines connected the offices to each other, and to the internet. Each office had individual networks as well, some of which connected to other local ISPs and telecommunications companies, not to mention wireless and satellite hubs that further 'enhanced' the companies ability to communicate and stay mobile, fast reacting, and on the cutting edge.
For a network manager concerned with fending off viruses and spy ware, or hackers and phreakers or worse, the network was a complicated border to protect. And make no mistake, these were important concerns for my team. However, they were not the top concern. We had information that simply could not be leaked, and the company invested huge amounts of money and time to ensure we had the best protection possible.
At the age of 38, I was relatively young, but I had been raised on the internet since its explosion as a public medium in the late 1980's. My career had begun at a major university in 1989 while I was still in graduate school. I had been recruited by a then large software firm to research the concept of viruses that were just starting to get the attention of average computer users at home when the personal computer was finally taking hold in homes and businesses everywhere. My work in the field of viruses finally turned into an actual career as I helped engineer some of the first embedded firewall firmware for corporate grade protection. This all finally led to my current position as Chief Security Officer at "X" Inc. (I will use "X" to protect the innocent… and the not so innocent.)
When hired at "X", the stakes were already high. The company had just suffered a major loss of intellectual property, as a highly trusted researcher had been caught emailing secrets to a competitor in exchange for a fortune in stock options and cash. Eventually the traitor jumped shipped and went to work for our competitor, but not until several key products in our current line were compromised. By the time the leaks were discovered, the researcher was long gone and the problems of instant communication via email and chat-rooms were of urgent priority for the board and executives. While the company eventually survived this terrible loss, they were determined not to have it happen again, and thus I entered the picture.
Given a hefty six-figure salary and with a budget that could finance a small country, I was asked to put in place whatever it took to protect the company from such damages ever happening again. I took 3 months and surveyed the current network architecture and then spent millions of dollars over the next year to put in place the state of the art corporate network. From firewalls to encryption to deep inspection of every packet traversing our private network, I eventually had visibility and control over every bit of data that left or entered our company domain. This even included voice communications, as all phone communications were carried over our digital circuits via VOIP switches. Million dollar voice recognition systems listened to every phone call and analyzed anything considered sensitive. And beyond my expertise, we hired private investigators to keep tabs on those who were privy to the most sensitive of our corporate secrets.
Within months of its completion, over a dozen potentially damaging incidents had been discovered, verified, and shut-down before any harm was done. This included several firings and a couple departmental reorganizations, and the message to the executive team was clear… the investment was already paying off. My network and my team were praised and given even more money and power to continue our efforts. We expanded our tools and protection schemes with ingenious algorithms written in house and used by no other company in the world, built to sniff out even the most trivial of concerns within the company.
While the result of my teams work was evident to the board and executive team, most of the company didn't even know we existed. To them we were a bunch of geeks locked in a server room with a lack of social existence otherwise. The executive team had intended this, fearing that if anyone found out about our real purpose it would only scare the innocent and send the guilty into hiding… or worse… into even more secretive and innovative ways of profiting from our IP.
We let employees continue to user their phones, email, and to browse the web as though nothing had changed. In fact, our work had actually sped up our internet connections and our network in general. We added tools such as instant messaging and other tools to promote valid and essential communications internally, but of course monitored everything… no exceptions.
The company had policies that outlawed pornography and other content that might cause us lawsuits or violate sexual harassment statutes, but the enforcement was only in the extreme condition. We made no attempt to block access to those sites or even to moderate content based on rating or keyword. We simply watched that traffic like all other traffic, and noted it in internal files. It was used later as ammunition if corrective actions were needed against employees that were becoming troublesome but had not yet presented other severe incidents that would warrant termination. This digital voyeurism of adult behavior, however, is where my story really begins.
Before I start confessing my addictions and sins, I want to make one thing very clear: I never jeopardized the company and the primary purpose of my existence there. But I do admit that certain distractions eventually 'presented' themselves and I had not the self-mastery to control their effect. In fact, as you will read shortly, I really didn't even have the desire to turn away from the temptations offered as a fringe-benefit of my work.
I was always fascinated by the emails that would end up on our audit reports, such as those that contained details about illicit affairs, strange fetishes, and closeted homosexuals. I am a very open minded and accepting person, but some of things that people found titillating and erotic even caught me off guard. As a network security engineer with a history of researching viruses and the dark underbelly of the internet world, I had seen almost everything and so the topics never offended or even surprised. At least they didn't surprise nearly as much as the astonishment that came when learning which of my coworkers were into certain fetishes and obsessions.