Girl threatened, subsequent dirty deeds from SelectQuote and cops.

Yahoo Mail Thinks Ed Donegan is Topu Ahmed

Snippet returned in Yahoo! Email address was Ed's when he worked at Wells Fargo.

Snippet returned in Yahoo! Email address was Ed’s when he worked at Wells Fargo.

When I found an impostor blogging as Ed Donegan, I went to search my email for correspondence from him.  It’s been over ten years since Ed sent me an email, and I wanted to make sure I remembered everything correctly.  Yahoo’s search mail feature also returned this Facebook profile of an 18-year-old Bangladeshi.  This could be a bug, but I suspect something fishy is going on.

Searching the web for Ed’s same email address turns up things like the following archived discussion on network intrusion detection:

The problem with IDS via RMON, which this discussion almost borders, is that
a few things have to be true. First, the “intrusion” has to be noisy enough
to have statistical consequence. The heavy duty worms running through the
street blasting away with network floods or application hijacking en masse
might register on a carefully thought through statistical algorithm, but the
noisy ones are not where I would consider the challenge of IDS to be. That
assumption was listed early on in the start of the thread though as a given.

More troubling with this line of development is the challenge of trying to
define statistical concepts of network normalcy.

Ed Donegan

Ed Donegan

This really drives home my point about that blog being fake.  Just look at the differences in writing style!  That impostor was posting multiple times per day for the last several months, often very disorganized thinking, always poor writing.  He did suddenly stop on the 9th of this month.  Given his rate of posting, that is a significant pause.

The last email I really did get from Ed was in 2004.  He sent it to a number of friends, asking us to warn a woman that police videotaped scenes of consensual BDSM between him and various women at the Bondage a Go Go nightclub.  I didn’t know her, and figured someone who did might follow-up.

What Happened Between Michelle Tan and Andrei Kolesnik?

I wrote whatever happened off as none of my business at the time, but women in the office seemed to be bothered by something.  Since recent posts revisiting events occurring around or before the threats to my daughter’s life have proved quite popular, I’ll have another look.  Perhaps recent scandals have lessened people’s tendency to dismiss me offhand as some internet crank. Also, I’m no longer flailing about for a motive, which makes the facts more clear.

At SelectQuote we sometimes had IT parties held at Andrei Kolesnik’s house in Concord. After one such party during the Fall of 2009, a number of women skipped the next one.  The next year we did it at a bowling alley instead.

Michelle Tan, who would later threatened to kill my daughter, was passed out in Andrei’s bed.  Andrei’s son was in his karate gi, and Andrei, Lilly, and Michelle were still left.  Lily asked me to check on Michelle. After verifying she wasn’t on her back, and breathing was fine, I caught a ride with my manager and others.

SelectQuote Undermines Its Position

Jong Lee – pimped wife/kid, got this 4th home

My timeline of SelectQuote’s cover-up gives an excellent outline of actions related to the harm of children, but a more concise breakdown might be useful.  Here I am listing the ways in which SelectQuote has undermined its own story after 2010.

2010 was the year in which Michelle Tan made threats concerning my daughter.  Also, SelectQuote appears to have been involved in actions which actually did cause her harm that year.  My accusations might seem fantastic at first, but these events after the fact serve to show SelectQuote really did what I accuse them of.  Each topic is delved into much greater detail elsewhere, but  I want to give the reader a short list of why my opponents should be doubted.

  • Benefits were lavished on the conspirators shortly after my termination.  Michelle Tan received considerably more time working from home than anyone else in IT, and her husband Jong Lee got Java work as part of the team that replaced me.  After my investigative reporting uncovered this graft, Jong Lee no longer posted publicly accessible updates regarding his work with SelectQuote on GitHub.  When I began writing more articles after a brief hiatus, Jong and SelectQuote attempted to hide this smoking gun. (I have screenshots.)
  • They were obviously expecting smooth sailing, as they picked up a second house in Pleasanton, CA not long after I was gone.  Actually, Block Shopper shows a new property record on their primary residence one month after I took this site down in the Fall of 2012.  Jong Lee is now listed first for their residence at 3552 Carlsbad Ct., in Pleasanton, but I don’t know what kind of transaction this was, or if it had anything to do with my hiatus.
  • SelectQuote declined to look into whether I had ever communicated with Michelle Tan about the threats against my daughter.  Michelle Tan lied about such communication, I was able to confirm this in the summer of 2011.  RFID logs or witnesses could have helped my case, but SelectQuote would rather remain ignorant of the facts.
  • I was impersonated on social media sites.  Fake Blogger, LinkedIn, Twitter, Facebook accounts were all created.  Content posted either understated my resume, or was nonsense designed to make me look bad.  I was in the middle of the job search, so in addition to undermining my reporting on the SelectQuote scandal, the rhythm of my job search was broken.

Fashion Conscious Feds vs. Leader of San Francisco Tong

Gee Kung Tong

Gee Kung Tong

Back in 2006, Shrimp Boy Chow wore a white suit to Allen Leung’s funeral.  Leung proceeded Chow as the leader of the Gee Kung Tong, and since then Federal agents have been trying to tie Chow to Allen’s murder.  The investigation became known as Operation Whitesuit, and it appears to have become an obsession to some in the federal government.

Legal analysts say it is difficult to prove entrapment in the federal court.  Well it certainly must be.  Federal agents racked up a bill of 1 million dollars wining and dining Chow.  You’d think that someone would have stood up and reined in the largesse at some point.  Just to make sure they weren’t crossing the line.

After all, Chow did not get a new identity after turning state’s evidence to reduce his sentence on a previous conviction.  Instead he was dumped in Chinatown, where we might surmise he probably has a few enemies.  The way his attorneys tell it, he was living on the charity of others.

Then an undercover agent comes along and plies Chow with drinks.  Despite Chow repeatedly turning him down he continued to attempt to seduce Chow into criminal schemes.  A reasonable person might conclude then that no crime would have occurred without the involvement of the Feds. 

These tactics are reminiscent of the collusion between divorce attorneys, private investigators, and the Contra Costa Narcotics Enforcement Team that the FBI brought down.  Federal law, however, disallows an entrapment defense if the victim of entrapment has shown proclivities to commit the crime in question.

FutureStack 15, Day One, Part One

FutureStack15Today I was at NewRelic’s FutureStack 15, at the Fairmont Hotel.  NewRelic is a cloud-based software analytics tool, which allows you to monitor application performance, find out how customers actually use your product, and alert people when your deployed software is failing.  I’d like to consolidate my thoughts on interesting points brought up in the technical presentations, and figured some of you might be interested.

While monitoring and logging systems may seem like a boring problem, consider that a thorough record of users’ interactions will be many time larger than the customer and order database(s).  Logical places to monitor requests for a web application, for example, could include entry and exit points as well as notable operations at the browser, load balancer, web server, application server, and database.

NewRelic keeps all of this data, and does not shrink it by aggregating records that get stored in the database against which reports are run.  This means you can drill down to the individual customer.  This is realtime, no indexes are built.  Users can do arbitrary segmentation.  Like find out how the error rate for male users buying fly swatters with as their ISP compares to your average customer.

There was discussion as to integration with Amazon EC2 and Lambda, as well as Docker containers.  These deployment units may be much more ephemeral than a server or standard virtual machine.  Rather than looking at individual servers, it makes sense to label this type of micro-service by function.  The reporting user can then do things like track function response time changes as containers are spun up or down.

Trade-offs Between Privacy and Usable Web Sites

Few people report problems with a web site.  It is up to the administrator to determine problem areas through logging.  Yet different logging solutions give wildly different results for the same web traffic.  The most robust method used to be using Javascript and/or tracking pixels to make requests to a separate directory or server.

WebTrends, Google Analytics, or Open Web Analytics are the sorts of tools I’m talking about.  They are able to track information on screen resolution, behavior on the site, repeat users, and geographic location.  Such information may not be in web server access logs at all, and certainly not in an easy to read format.

This data is invaluable for finding problem areas.   For example, if I segment behavior by resolution or client type, I can infer whether the site design stands up on smartphones small touchscreens.  No user will report it if it is hard to click on links on their smartphone, they will just have a visit of only one page.

How is SelectQuote Connected to Burglary?

My street has no front yards, and one of the effects of this is it becomes harder to meet ones neighbors.  Heck, Joe Gibilisco, the man who handled SelectQuote’s phone system before my predecessor, lived at the end of the block for years and I only saw him a few times outside of work.  People who never show up to neighborhood watch meetings or an annual BBQ might remain unknown to me for years.

So looking at past events from a new angle might reveal some connections missed before. My recent post about break-ins that occurred while there were keys hanging from my window has been popular.  Could this be the reason that fake Ed Donegan picked now as the time to write a derogatory post referencing me?

The real Ed Donegan did not know me as TD.  That nickname was only used at work, it came about when I was on a project with someone else named Tom.  Not to mention the confused thinking going on in Ed’s reminiscing about a past that may have only occurred for him.  Well, past experience suggest that something else is coming after a new round of impersonation.  I’ll continue along this line of inquiry, and see if something clicks.