Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

4/6/2007
07:28 PM
Patricia Keefe
Patricia Keefe
Commentary
50%
50%

Should IT Departments Oversee Spying Operations?

Wal-Mart always seems to be in the news for one reason or another. Supporters tout its pioneering marketing model and groundbreaking success in offering low-cost goods to consumers and keeping operational costs low. And then there is Wal-Mart's leading-edge IT department and its cutting-edge use and investigation of bleeding-edge technology -- ever in the pursuit of keeping costs low and maximizing profit.

Wal-Mart always seems to be in the news for one reason or another. Supporters tout its pioneering marketing model and groundbreaking success in offering low-cost goods to consumers and keeping operational costs low. And then there is Wal-Mart's leading-edge IT department and its cutting-edge use and investigation of bleeding-edge technology -- ever in the pursuit of keeping costs low and maximizing profit.Critics claim the company badly underpays and compensates employees, undercuts local businesses and is a different sort of leader when it comes to the practice of questionable labor and competitive strategies.

In recent weeks, a new wrinkle has emerged in Wal-Mart lore that should provide fresh grist for the endless debates about the company. It's an issue I can't help but wonder what our readers think about.

Wal-Mart recently fired two employees for illegally recording conversations with a news reporter, after notifying authorities about the incident. One of the fired employees claims the company maintains an internal surveillance organization, which keeps tabs on company critics, employees and who knows what else. What really caught my attention, was an AP story I read that said the surveillance unit, called the Threat Research and Analysis Group, was a unit of Wal-Mart's Information Systems Division. Other stories from other sources say the group worked on the third floor of Wal-Mart's Bentonville, Ark., technology offices.

The issue of corporate spying aside, I found it interesting that this group is supposedly attached to the IT department. On the one hand, given the role technology can play in monitoring employee computer activity and network access attempts, all fairly normal corporate activities - it's not surprising IT would be involved in corporate surveillance. On the other hand, keeping tabs on critics and competitors, regardless of the technology deployed, would seem to be an activity better suited for the oversight of the legal or corporate security department.

What do you think? Is the idea of attaching a corporate spy group (or whatever you want to call it) to IT logical, or do you find it kind of creepy? Maybe this isn't that unusual - especially in a post-9/11 world, so I am wondering, does your IT department assist with or engage in such activities? As an IT worker, is this something you want to be involved in? Or, as an IT manager, something you feel equipped to oversee or contribute to? Let us know what you think by commenting below.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/27/2020
6 Ways Passwords Fail Basic Security Tests
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/28/2020
'Act of War' Clause Could Nix Cyber Insurance Payouts
Robert Lemos, Contributing Writer,  10/29/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How to Measure and Reduce Cybersecurity Risk in Your Organization
In this Tech Digest, we examine the difficult practice of measuring cyber-risk that has long been an elusive target for enterprises. Download it today!
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27652
PUBLISHED: 2020-10-29
Algorithm downgrade vulnerability in QuickConnect in Synology DiskStation Manager (DSM) before 6.2.3-25426-2 allows man-in-the-middle attackers to spoof servers and obtain sensitive information via unspecified vectors.
CVE-2020-27653
PUBLISHED: 2020-10-29
Algorithm downgrade vulnerability in QuickConnect in Synology Router Manager (SRM) before 1.2.4-8081 allows man-in-the-middle attackers to spoof servers and obtain sensitive information via unspecified vectors.
CVE-2020-27654
PUBLISHED: 2020-10-29
Improper access control vulnerability in lbd in Synology Router Manager (SRM) before 1.2.4-8081 allows remote attackers to execute arbitrary commands via port (1) 7786/tcp or (2) 7787/tcp.
CVE-2020-27655
PUBLISHED: 2020-10-29
Improper access control vulnerability in Synology Router Manager (SRM) before 1.2.4-8081 allows remote attackers to access restricted resources via inbound QuickConnect traffic.
CVE-2020-27656
PUBLISHED: 2020-10-29
Cleartext transmission of sensitive information vulnerability in DDNS in Synology DiskStation Manager (DSM) before 6.2.3-25426-2 allows man-in-the-middle attackers to eavesdrop authentication information of DNSExit via unspecified vectors.