I'm not. This kind of crap happens quite frequently. Businesses / Organizations that don't have automated compliance enforcement policies & mechanisms see this kind of crap all the time.
Twatter's no different from more places I'm aware of than I can shake a stick at.
I work in financial services which is heavily regulated. We have our own automated compliance enforcement systems, backed up by manual audits and fed oversight who comes in and frequently audits our systems for sh*t like this. Not saying it could never happen where I work however the chances of it doing so are so slightly remote that if someone were to manage to manipulate the system, it would be discovered in minutes measured in the single digits and that device would automatically be removed from our network to prevent corruption/damage to our systems.
So unless a business / organization has the money to spend on these kinds of automated protective measures, this kind of crap happens all the time. Seen it first hand.
Non-citizens - think H1B workers - uniformly do not even understand or comprehend the Western idea of Right and Wrong.
I am sure there are exceptions. But once an HR dept starts using foreigners to create lists of potential new employees, the recruiters will game the system and get jobs for their buddies from overseas. Or for a cut of the expected wages.
Watched it happen and have lived it.
I get it. People hire people that are like them. But the HR oversight we expect simply does not exist in companies like Twit, Alphabet and M$.
And we as a country are poorer for it.
Ditto, but I think we can both agree that this was not about lack of 'money'.
Yes, it happens. In 2006 I was working internal security for a major defense contractor. My work cube was next to the regional IT security manager. One day, we got a call from corporate IT security that sensitive corporate data was moving from our location, to a corp location in Portland, Oregon and on to places unknown.
When we began our investigation, we immedietly discovered that the leak was coming from the IT security managers computer. Unplugging the computer ended the leak.
We never did find out how the leak began, in spite of NSA grabbing a disk image and running their own investigation.