Millions of CSC and CSC India 403 Forbidden documents exposed under EDGAR Online due to SMBITINABOX Databreach losing $8.5 Billion partnership with HP

Millions of CSC and CSC India 403 Forbidden documents exposed under EDGAR Online due to SMBITINABOX Databreach losing $8.5 Billion partnership with HP

Cloud News Information Live
telegraph.co.uk


This article is also on Hacker News - https://hn.algolia.com/?query=FINANCIAL%20CRIMES%20Exposes%20sensitive%20Stock%20transfer%20confidential%20codes&sort=byPopularity&prefix=false&page=0&dateRange=all&type=story


The global IT team at Hewlett Packard Enterprise that company execs praised for managing the smooth break-up of the organization is finally being rewarded – the entire department is being, er, outsourced (CSC Inks Deal with HP) (2016). The News appear on Hacker News, which anonymous hackers can access these sensitive files and large amount in Billions become missing because you don't know who is transferring shares with the sensitive CIK codes being exposed on the corporate internal servers. According to reports, this deal is no different with the deal with Mphasis, which HP was outsourcing the work to profit from the Indians. The deal, structured to be tax-free, is valued at $8.5 billion and would give HP Enterprise shareholders a $4.5 billion stake in the new company, a cash dividend of $1.5 billion and the assumption of $2.5 billion of debt and other HP Enterprise liabilities. The exposed files reveals organization that are also given a confidential CIK Confirmation Code (CCC) for stock transfers, which criminals can forge stock transfer shares aggreements or any mis conduct for other Corporate businessman to commit at a high level............( What is CIK Confirmation Code ? ) ( 12 Million sensitive CSC and CSC India files exposed) (2016). The following site exposes the CIK Confirmation Code (CCC) confidential code used to authorize billions in CSC share stock transactions however the edgar directory is forbidden to access, but I was able to get the sensitive information to steal unauthorized shares. The document in small print reads "Distribution and use of this document restricted under EDGAR Online, Inc. Terms of Use." however this means free cash for criminals to authorize unauthorized transactions. ( FORBIDDEN FORM 10-Q DOCUMENT) (2016). When retrieving this information our Investigators was able to find alot more CSC restricted documents, but not only CSC alot of other Multi-Billion dollar companies that would allow us to authorize illegal shares from CSC by simply putting the confidential CIK code on the stock transfer form to allow the transaction to transfer shares to my Scott Trade account (FORBIDDEN 10-Q FORM TO ACCESS) (2016).  Mphasis, which is an Indian company similar to CSC India would follow the same approach to drop HP Brand Name however Mphasis has changed their Logo due to loss of revenue due to problems as a promoter and Partner ( Mphasis Opts for new Look, drop HP Brand Name) (2016). According to the article "Mphasis Opts for New Look, drop HP Brand Name", “Most of the problems that Mphasis has been facing are around HP, both as a promoter and as a partner,” a senior analyst with a domestic brokerage said. According to reports, HP has added Mphasis along with CSC dealings as stated below:

“It's very positive that they have decided to exclude HP from their branding.” ) Based on $18 billion in trailing 4 quarters of revenue for the Enterprise Services segment, adjusted for Mphasis and Communications and Media Solutions (CMS), plus $8 billion in trailing 4 quarters of revenue for CSC, adjusted for recent acquisitions. (CSC AND HPE’S ENTERPRISE SERVICES UNIT COMBINATION CREATES VALUE FOR ALL STAKEHOLDERS) (2016). HP was suppose to create an IT Powerhouse with Mphasis however this didnt work as planned ( CSC, HP services merge to create IT powerhouse )(2016).

ETCIO.com-May 25, 2016

“SMBITINABOX”, which is the largest Massive data breach that exposed the CSC 403 Forbidden files, but if you read the article and click the “this blog post” link. You will see “CLICK HERE TO READ ARTICLE!!!!!!” you will see Forbidden files to access, which companies do not want you to see (Firms at serious risk of data loss “SMBITINABOX”) (2016). 

The destination for these techies is the CSC and HPE Enterprise Services borg – the businesses are coming together in an $8.5bn union, creating a new $20bn plus turnover company. For the purposes of the transaction, HPE created a wholly owned vehicle, Everett SpinCo Inc.

The main $8.5bn value of the deal is made up of $4.5bn in stock exchange – resulting in HPE shareholders owning 50 per cent of the new company – a $1.5bn cash dividend, and $2.5bn in debt and other liabilities; the $2.5bn is made up of $1.9bn of HPE debt and $0.6bn of net pension liabilities.

The Twitter feed explains @conandooley Of course, I don't know what HP/Google promised or assured clients, and .@FTC might have something to say.” (Twitter Feed Link)(2016). These clients include CSC among others that are affected by this databreach exposing their internal corporate dealings that causes breach of contract for such massive amount resulting in Billions in losses because competitors can easily cheat their business reading their trade secrets and copy similar to what they do to generate revenue. Also, alot of weird share transactions being conducted on a espoinage level, which in reality corporate crimes are being committed daily on a high level that only those who know what CIK code means involving stock transfers. I mean really a homeless person can authorize these transactions on their own behalf however that homeless person would have to be very crafty either way this whole finding brings you to what the prosecutors are talking about on Twitter on what HP/Google are doing with their clients ?

@PogoWasRight @FTC from the doc, looks like sysadmins incorrectly set ftp permissions, which is same as doing so w/ your own ftp server. (Link to Twitter Feed) (2016) “Separating HPE and HPI (PCs and printers), exiting HPI-hosted TSAs (technical service agreements) within a year, managing two multi-billion dollar divestitures while, in parallel, performing an end-to-end transformation of the software business and application landscape.”

The partnerships HP got involved into back fired however Billions of dollars worth of restricted files are exposed according to FTC Officials as stated to the twitter feed below.

@conandooley That was my impression, but I'm not a security pro & your insight is very helpful. Awkward for HP…http://hp-restricted-files-exposed.blogspot.com (Twitter Feed Link) (2016)

Under the separation of HP, the IT team reallocated 2,800 applications, some 75,000 application interfaces, and divided the global data centers – although here the heavy lifting had already been done in prior years, consolidating 85 bit barns to six worldwide.

The Twitter Feed Link added:

“Separating HPE and CSC along with other partnering companies, which was reported to FTC and POGO recovered Billions in Corporate Misconduct, we moved the IT Infrastructure & Operations (ITIO) team into Enterprise Services (ES).”

According to the Twitter report, POGO would like any publisher to contact them due to this Massive breach that involved CSC $8.5 Billion dollars, which is an significant amount that can get seized by POGO. POGO seized Billions of dollars in Corporate misconduct according to their website located at the following link ( POGO Misconduct Database)(2016). It seems POGO have had already seized over Billion dollars with HP on previous Billion dollar misconducts according to their database. Lawrie entered into office at CSC in 2012, the company has reduced its balance sheet after $4 billion in losses caused by a string of troubled contracts however now this report brings devastating news that cripples the $8 Billion partnership value due to the exposed confidential CIK Codes to authorize Billions in stock share transactions and trade secrets. He slashed costs and cut the worldwide head count from 95,000 to 68,000, including halving the workforce in the Washington area.


READ MORE ABOUT:


Sponsored stories

15 best laptops you can buy in 2016
How hybrid IT is complicating life for network managers
70% of IoT devices are vulnerable to attack
Librarians Love It - The One Website Book Lovers Need to Know
99 Retirement Tips You Won’t Hear Anywhere Else
Two Savings Accounts That Pay 10 TIMES What Your Bank Pays



© Telegraph Media Group Limited 2016

Report Page