19
Fri, Apr
5 New Articles

The Scumware Conspiracy

Commentary
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

I'm not a conspiracy theorist. It's true that, as a paranoid person, there's no doubt in my mind--no doubt whatsoever--that everyone, absolutely everyone is out to get me, but I think they're acting independently. Only a particularly diseased mind could believe that the whole world is conniving in concert as part of some grand conspiracy against me. Surprisingly, that's not something I believe. Then again, I may be wrong. Maybe the whole world is plotting against me and I'm the only one who doesn't know it. But no, that couldn't be it, could it?

While I'm not a conspiracy theorist myself, I offer this hypothesis for those among you who are, in case you're running out of theories of your own: Governments and PC makers are working in cahoots to create and infect our computers with spyware, adware, viruses, and other sorts of scumware. Spread the word. And remember, you read it here first.

This isn't something that popped into my mind fully formed. I heard it from a woman I met on the street. She was wearing a hat made of aluminum foil so that the government wouldn't be able to read the electromagnetic pulses generated by her brain and a lead suit to protect her from the gamma rays that our enemies are beaming at us around the clock in order to sterilize us. At least, those were her explanations for her rather bizarre getup. Based on her protective gear, I at first thought she was a woman I had dated for a while, but it turned out that I was wrong about that.

The whole time that I was with her, her eyes constantly shifted furtively from side to side as if she expected to catch somebody following her. In addition, she persistently bobbed and weaved precisely out of synch with the movement of her eyes, which, she explained, made her a more difficult target for the enemies arrayed against her, although it also made our conversation somewhat disconcerting for me. Being an obviously very nervous person, she probably wouldn't have talked to me--a total stranger--at all, but we neurotics have a natural affinity for each other. There was that and the fact that she was from out of town and desperately needed directions to the convention center.

Because she looked extremely weird even to me, I was ready to discount everything she said, but then she told me that she was an investigative journalist. An investigative journalist! How could I possibly doubt her story after learning her occupation? Working undercover, she had infiltrated Area 51, the top-secret military installation in Roswell, New Mexico, where the government is hiding the aliens who landed on our planet. She was in town to attend a UFO convention, where she was going to reveal her findings. I was still reluctant to believe her, but she showed me her press pass, so I knew she was legit. After relating all of this to me, she told me about the last story she worked on--the one in which she discovered the clandestine plot hatched by the government and the PC makers.

I'm no fool. I'm not going to fall for a fairy tale told by some nut on the street. If I wanted to do that, I'd just listen to the voices in my head. So I did my own in-depth analysis of the evidence. I'm now convinced that she's right.

How did I come to this conclusion? Let me start with the PC makers. How do they make their money? They make it by selling PCs. That's how. Anything that helps them sell more PCs makes them more money. Plain and simple.

What did I read in a July 17, 2005, New York Times article titled "Corrupted PC's Find New Home in the Dumpster?" Yes, that's right. People are junking their PCs rather than going through the aggravation of trying to sweep the adware, spyware, and viruses off of them. That seems a bit extreme to a skinflint like me, but there you have it. There's the clear motive for the PC makers to create and distribute the evil scumware that threatens our computers.

Do you want further evidence? What type of employees do PC makers have in abundance? Geeks, that's what type. Geeks are just as capable of writing malicious software as they are of writing the good kind. OK, now we've got the means and the motive. All we're missing is the opportunity.

Missing? Yeah, right. Even if your PC had been shipped to you clean (and tell me, exactly how would you know that there wasn't already any scumware on it when you got it?), what does every computer come with these days? Along with other suspicious electronics, they come with modems and network cards. In addition, laptops usually even have one or more varieties of wireless networking capabilities built in. You don't have a choice. It's just there. Why do the PC makers do it? Is it out of the goodness of their hearts? Not on your life! Thanks to this ploy, just about everyone's computer is now connected. And that provides the opportunity to distribute scumware. Motive, means, and opportunity--there isn't a jury in the world that would acquit them.

It all comes down to unbounded greed. The PC makers have been making good money over the years simply by relying on legitimate software vendors to continue to add more and more features that people don't really need. At the same time, the software vendors also spend a lot of their marketing dollars to convince people that they can't possibly live without these new features. The result is that no computer older than six months is able to run today's software. But I guess that replacement cycle wasn't short enough for the PC makers. Or maybe they didn't want to rely on someone else to do their dirty work for them any more. Whatever the reason, the case is clear: They wanted more. Greed. Greed. Greed. That's all it is.

OK, I've proven the PC makers' participation in the conspiracy beyond a shadow of a doubt, but what about governments? Where do they fit into this scheme? I'm glad you asked.

Over the past few months, I've been reading about more and more jurisdictions that have imposed or are considering imposing taxes on PCs to cover the cost of disposing of or recycling them. Sure, the tax may initially be set at or below the breakeven point, but how do you bring costs down? Volume, that's how. In order to achieve economies of scale and improve efficiency by learning from experience, governments need their citizens to discard lots and lots of PCs in the governments' disposal and recycling operations. It's the only way that they can make money on these new taxes.

Do governments have the means to develop scumware? Maybe not. If you believe the media, just about every IT project that governments undertake comes in way over budget and way behind schedule, if it's completed at all. If governments tried to write the scumware themselves, they would almost certainly end up losing money on the deal, assuming that they ever managed to finish the software in the first place. That's why they needed to involve the PC makers in their wicked conspiracy. It's an open and shut case.

I know what you're thinking: I've shown only the government's motive. How can I convict them of a conspiracy on such scant evidence? Well I ask you, who are you going to trust, me or the politicians? I rest my case.

So that's it. No rational human being can refute it. The government and the PC makers are participating in a massive conspiracy to inflict spyware, adware, and viruses upon us. Of course, I could be wrong. In which case, the conspiracy theorists can go back to investigating and propounding the fluoride in the water system, the Kennedy assassination, and the faking of the moon landing conspiracy theories.

Joel Klebanoff is a consultant, a writer, and president of Klebanoff Associates, Inc., a Toronto, Canada-based marketing communications firm. Joel has 25 years experience working in IT, first as a programmer/analyst and then as a marketer. He holds a Bachelor of Science in computer science and an MBA, both from the University of Toronto. Contact Joel at This email address is being protected from spambots. You need JavaScript enabled to view it.. He didn't get the number of the lady with the aluminum hat. If anyone has it, please pass it along. She kind of turned him on.

Joel Klebanoff

Joel Klebanoff is a consultant, writer, and formerly president of Klebanoff Associates, Inc., a Toronto-based marketing communications firm. He has 30 years' experience in various IT capacities and now specializes in writing articles, white papers, and case studies for IT vendors and publications across North America. Joel is also the author of BYTE-ing Satire, a compilation of a year's worth of his columns. He holds a BS in computer science and an MBA, both from the University of Toronto.


MC Press books written by Joel Klebanoff available now on the MC Press Bookstore.

BYTE-ing Satire BYTE-ing Satire
Find out the hilarious answer to the eternal question: "Is technology more hindrance than help?"
List Price $14.95

Now On Sale

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$0.00 Raised:
$

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: