top of page

Everything that makes up the content of this website is an author's work and is therefore protected by copyright law.  
This work and its parts can only be used with the permission of the author. 

  • Writer: RFERL Watch
    RFERL Watch
  • Apr 8, 2023
  • 8 min read

Updated: Apr 9, 2023

It was the end of November 2019 and Radio ГA / ГA was licking its wounds after the events that changed its inner life in many ways. It was a time made for new generals and self-proclaimed "so-and-so" specialists who, as is customary in these parts, always knew everything long ago. A group of "characters" quickly formed, who, according to the thickness of the butter on their heads, increasingly pointed out around them who was to blame. At a time when the hospital in Benešov in similar situations openly pointed out the reasons for the failure of its security measures and when it tried to learn from its mistakes itself, Radio ГA / ГA focused on the search for the internal enemy and it was not idle at all in its efforts.


ree

When my supervisor and superhuman in one #RC("Remotely Controlled") realised that he couldn't get out of this mess on his own, he started looking for allies. He began to exert his irresistible charm on some of the members of his tribe and beyond, and thus he used his position to find and influence a suitable native useful idiot. There was not enough time and expertise, so he came to me with an offer of candy. My former reminders about system security, including the method of not deploying them, have been forgotten. Politically, he explained to me that it is necessary to take countermeasures as soon as possible, something like "lessons from the crisis period". He even patted me on the back for the first and last time for trying to help him so selflessly during the "Thanks Giving Days" days off. Simply, it was an unforgettable experience and his kind touch somewhere above my right shoulder blade kept me incredibly warm for several days.


And so, from 27/11/2019 to 1/12/2019, I began to collect extracts from the logos for him and gather materials for the gathering of the most anointed ones. Each of us, as I subsequently understood, acted with a different goal. While I thought it was to find out the real causes and prevent them from happening again, for him it was a simple effort to gather evidence and present it without me. In our country, according to the well-known I'm nothing, I'm a musician.


As a musician, he learned to play very quickly and, as far as possible, not too fake. Because on 2/12/2019, his rival in the unsuccessful campaign for the position of IT security director, #JS ("Joints Smoker") was returning from vacation and it was necessary to play the most pleasing score for their common superior. The fact that they wouldn't take me into the musical trio was ultimately to be expected.


The ensemble grew. On 29/11/2019, a colleague-administrator advised me to change the password to my private email account on the public email domain just to be safe. Although I didn't quite understand the reason, I did so, but from a network outside of Radio ГA / ГA. A worm of suspicion began to gnaw at me that if I ever play with them again in the band, then at most in the role of an extra. When I confirmed the password change about 40 minutes after his request, I was surprised by his immediate email question - "Are you at work?" From that moment I stopped trusting them all.


When I provided #RC("Remotely Controlled") with all the materials I was able to find out and collect for him, I became useless to him and the rest of our miniature musical ensemble. And so I started preparing for a possible life without music.


During this period, on the weekend of 30/11/2019 – 1/12/2019, I also created a complete time frame of the incident ("Incident Times Frame") from the documents I found at that time. It was very comical to watch our court tug-of-war over its authorship a few months later with the lawyer of the defendant #MV ("Mgr. Prasátko"), thus we certainly made an unforgettable mark in the history of the Czech judiciary.


So what made Radio ГA / ГA deserve the attention of a famous hacker group?

In addition to bashing them like a god through their website, these were probably the basic offenses that the famous company Microsoft recommends to avoid:


Users:

  • do not use "basic authentication" instead of "modern authentication" to support various outdated mail clients and mobile devices

  • use MFA (multi-factor authentication) for 100% of users

  • use "self reset password" (possibility of individual password change)

  • synchronize passwords with local domain

  • applied policy for password deployment and changes in O365

  • not using "outdated" protocols IMAP, POP3, SMTP

  • recommends using the audit system for O365

  • don't use the basic (cheapest) license model that doesn't allow for advanced protection methods

  • do not use "generic accounts" (accounts for which passwords have been shared)

Administrators:

  • it is recommended to use a dedicated computer for administration, even though I requested it (officially on 18.10.2019) and this request of mine was never approved by my supervisor

ree
  • lack of training in the field of administration - said to be too expensive

  • not using "conditional access" (conditional access) - again thanks to the use of a cheap license model

For the latter and very effective measure, these days appeared interesting article on the ZDNet portal, where Microsoft announced that "Microsoft is implementing these security settings to protect millions of accounts.", and so it is basically only today setting security settings globally rules implicitly for their cloud customers who were facing the same problems as Radio ГA / ГA at the time.


If only they had come with them earlier...


And so Monday 2/12/2019 came, the day when #I, like a broken dog, together with my handler #RC("Remotely Controlled") had to appear in front of the other smart ones. As soon as he met his rival #JS ("Joints Smoker"), a sharp exchange of views began and "the well of ideas opened wide". No one asked for my opinion, after all, when super-humans are talking, the opinion of a subspecies is uninteresting. And so I spent the moment I was at least "allowed" among them to observe the others involved. The old man, the superior of both managers, was just staring blankly into space and I had the feeling that he would be "knocked by heart attack" in the nearest moment. In fact, I have always wondered what this very old gentleman can do for Radio ГA / ГA. Perhaps only by using all kinds of Apple devices, otherwise I really don't know.


After yelling at each other, he finally dissolved this very fruitful meeting without further ado. After all, as quick as the meeting was called it was also terminated.


I left with mixed feelings. Me to my "open space" working territory, my supervisor, together with my colleague, somewhere higher up in the building. Where the almighty legal, HR was based and where I was banned from going there for the rest of my days. What if I said something inappropriate about anything important? For example, about the fact that my supervisor knew about the incident and did not act?


As my colleague himself wrote to me about his participation in the investigation of this mess by email:


I don't know the details and I can't even know them, I participated marginally in the investigation and its conclusions are not known to me, and I certainly wasn't looking for anything on you. I also don't know the reasons for your 'administration leave', I only find out it from you.

Unlike him, however, my supervisor went there more than to his office and dictated the correct information to the #LA ("Dr. Leklá Andělka") computer. In the meantime, specialists from the IT field from an unnamed company in Prague appeared, and since they did not find the right evidence either, forensic specialists from Microsoft were called after two days. For the #RC("Remotely Controlled"), it was beneath him to participate in their investigation, so I was the only one to spend this time with them.


Actually, there was no reason - he was spending his precious time writing up my statement, wasn't he?

So before I found myself "away" on "administration leave", as is the English name for something between house arrest, collecting dirt on you and preparing your statement, I spent several days in the presence of these specialists, extracting their knowledge. It was finally the training that I kept asking for without success and it didn't really cost Radio ГA / ГA a cent this way.


I gradually started to find myself outside of the music scene.


In the meantime, the specialists flew off to iron out the messes of their other clients somewhere else, and my work-obstacle period started at full speed. Everything was written down, examined, signed. Just how to deliver the pamphlet to me before Christmas? The humanists came up with an idea here too - after all, we have everything already prepared and we have 2 months to hand it over, don't we? We'll spend Christmas and the New Year, and when we come back rested, we'll kneel on him.


"Only we mustn't miss the deadline of January 26, 2020, comrades!" - they probably said to themselves.

And so from 19.12.2019 to 20.1.2020 the purchase of more secure licenses is being carried out feverishly and investments are being made in further security improvements, after all - exactly according to my previous recommendation. There is a thoughtless liquidation of "legacy systems", as Mr. Untouchable promised me during our last conversation. I always told him that if someone turns off this system, it is important to also tell the last person in the company to remember to turn off the lights. My exaggeration was confirmed - as quickly as he started the liquidation, he had to stop it quickly, because the systems depended each other began to gradually collapse under his hands.

ree

On December 19, 2019, the system for delivering voice messages to e-mails was the first to crash. The following day, #JS("Joints Smoker") informs colleagues about successful phishing attacks on Radio ГА / ГA social media accounts. Since at the turn of the year, #RC("Remotely Controlled") was not yet able to fulfill its next threat, i.e. turn off the system that detected this attack at the time, colleagues could still read one of its last monthly statistics (see below). Stolen identities in subsequent attacks, this was a real "masterpiece" of his part of activities.


ree

ree

On 1/1/2020, he added access rights to my mailbox so he could mine it and is starting another search of my mail.


He searches and searches and searches, but cannot find anything.


And so, thanks to his other inexpert interventions in the systems, they stopped being backed up, the queues of mails waiting to be sent to the Internet exceeded 20,000, there are errors in system groups synchronisation, reports of other attacks are increasing, but no one is addressing and fixing them. That these are also the accounts of the highest in the company's hierarchy? It's not a priority right now. And the person who was responsible for these activities until recently is sitting 4.5 km from the trouble spot at home and waiting as ordered by a bunch of untouchables. Only on the phone and reading emails, as they said.


Discipline, damn it guys, it must be!


My former band hardened and slowly moved to cacophony.


A colleague is having a mental breakdown and is staying home for treatment, #RC("Remotely Controlled") is about to take a desperate step that will eventually result in his leaving Radio ГA / ГA after 22 years of his "dream job". At their own request, as was emphasized several times in unison in court by #MV ("Mgr. Prasátko") and #JH ("Dr. Hustá").


But more on that later, because this famous ensemble still hasn't played its last note.




 
 
 
  • Writer: RFERL Watch
    RFERL Watch
  • Apr 8, 2023
  • 7 min read

Updated: Apr 9, 2023

Three letters that often say everything. They are often synonymous with mystery, the unknown, power and emotions. They influence our being and non-being worldwide, they help us with a shorthand and without a long speech to express who is who and where they belong. And if we accidentally get involved with one of them, it will be important what time we live in, and most importantly - which side we are on.


ree

Radio ГA / ГA, better said its version 0.0, was born during the Cold War. The "USA" stood at his cradle, more precisely its "MFA" and the all-powerful "CIA" assisted in the birth. In the birth certificate there was written the place of birth Munich, "BRD", or "NSR".


As in any respectable family, there were also various affairs there. During puberty, in May 1965, it was the affair of "PSB" captain Andrzej Czechowicz, and in 1969, the 7-year affair of "STB" captain Pavel Minařík. To this day, I still remember the nursery rhyme and jokes from those times, in which this his heroic act was described as - "Thank you very much for the dollars, I'm Pavel Minařík!". And there have also been several attempted assassinations, kidnappings and intimidation - by those with whom we were friends and whom we even applauded for that. Whether they were friends from "KGB", "Stasi", from "Jackal" or from "Securitate". Attempts at cyanide poisoning in a salt shaker in the canteen, or obtaining information from eavesdropping through it, these events are particularly well-known. It was just such a cool place where the agents of all the great powers, together with the agents of their satellites, visibly met and harmed each other. It was a strange time...


But times have changed, our friends "forever and ever" are now our arch-enemies, and heartless enemies have become our best friends. As time went on, funding from the "CIA" jumped and money began to flow from the "USC" (US Congress) and other sources. In its best years, it changed its permanent residence from Munich to Prague, then it also changed its logo "image" from a bell to a religiously neutral torch, and in 2021 it celebrated a beautiful 70 years here in good health.


But its mission remained unchanged. He no longer fears the use of jammers, does not have to release promotional balloons with leaflets, or drop radio receivers from helicopters. Truths, falsehoods and the "right opinions" can be spread much more effectively - via satellites, the Internet, spending money from anyone in role of modern preachers.


Holt, the form of "the one with the horse's leg" propaganda has changed a lot. But has the content changed?

Only the sides have changed.


Sometimes someone somewhere shut him down, or someone with a different opinion blocked someone's website. And when it got too bad, just like in its younger days, they tried to hire there.


USAGM as its founder has warned them several times that they are not doing well if they do not deal with IT security. As they wrote to them here via "GOVERNMENTATTIC.ORG" which published reports between 2017-2019 monthly and they informed here on 3.7.2018 that Russian Hacker group "STRONTIUM (known as "APT28", "Fancy Bear", "Pawn Storm", or "Sofacy Group"), subordinated to "GRU, has registered and took ownership of their official "rferl-mysharepoint.com" Microsoft domain and is trying to spoof their official web site.


Their friends-agents are known even in our "pools and groves" - as the organizers and executors of the attack on the ammunition warehouse in Vrbětice in 2014.

ree

Even Microsoft was not idle and tried its customers (also Radio ГA / ГA as well) to point on the activities of this hacking group here and since I had the opportunity to meet them "face to face", I can only confirm truthfulness of all the facts there.


Even though I don't really love this company, they published very interesting data in their study pricing information for "hacking" according to the type of attack used:


  • Identity theft and phishing attacks are cheap, but their price has been rising lately

  • DDoS attack (website flooding with queries) on unsecured sites is cheap and costs around $300 per month

  • Extortion attacks, of which there are many types, are conducted using ready-made tools that allow even average attackers to earn big money


ree

I don't think these information about the average prices for a cybercrime service need to be translated. With a price of $250 for a specific task, or with a price of $100 to $1000 for a successful identity theft? On the other hand, not quite a "buck" for selling 1000 login names and passwords seems quite a bit, don't you think?

ree

But Radio ГA / ГA did not listen and "beat" this "bad guys" group through the keyboard and the website of its American journalist. Thanks to this published information, it is not surprising that all those activities were as a "red rag" to them, and thus he was the first in the chain who indirectly started the whole action with my dismissal.


Some of his articles from previous years are here, here, here, or perhaps here. Another taster with information about the "STRONTIUM" group from its site just before the phishing attack is also here and here.


The fact that the incident at Radio ГA / ГA on 07.10.2019 occurred with the active contribution of the hacker group "STRONTIUM" it can be read in the statement of #JS ("Joints Smoker"), which he made at police station in November 2019 and under oath. It is interesting that this statement did not appear in the court file and the lawyer #MV ("Mgr. Prasátko") did not introduce it to the court at all.


ree

A possible reason is offered - I officially blocked this account on 26/11/2019 in the afternoon, and if this incident was known to Radio ГА / ГA already on 25/11/2019 and its technicians were already investigating the details of it before that day, it could be said with a high probability that indeed my supervisor #RC ("Remotely controlled"), who blamed this whole incident on me, really knew about it earlier (as I claimed in court), and most importantly - he did not act. This would make his so-called sworn statement with further other date manipulations appeared there, they all were quite implausible for the "independent" judge #JH ("Dr. Hustá").

So briefly how it happened.


On October 7, 2019, hackers attacked the journalist's account and successfully carried out a phishing attack on him twice. At this time, I successfully tested a special anti-phishing software that used elements of artificial intelligence to analyze attacks and was supposed to prevent similar events. When configuring it, I was warned by the supplier that I will wonder what is happening in our systems.


And they were not wrong.


In the course of testing, reports of stolen identities began to appear, some true, some false. Holt, the system gradually learned from the environment and started offering the first recommendations. And so it happened that while manipulating this hacked account, the identity of my personal account and also of the global administrator were stolen, which was revealed by the tested software. Such suspected activities did not fail me about 144 times before, as stated by the legal puritans at Radio ГA / ГA.


Into the silence of our "open space" office, my unforgettable words were heard at the time: “OMG! WTF?”. The same as the biblical one, also appeared here - "in the beginning was the word...".

In 16 minutes, according to an extract from the verifiable protocols, "in about an hour", as my superhuman #RC ("Remotely Controlled") claimed under oath, I was automatically prompted by the system to perform procedures, among which changing the password was a crucial point solving this problem. When logging in, I had no idea that the bad Russian guys had installed the malicious program "Evilginx" on the "carrotsoft" page two days before, which "intercepted" communications and even bypassed my two-phase authentication in the "authenticator" application on my mobile by using the "man in the middle" technique .


For all those who believe that "man in the middle" is the use of some ticklish sexual position derived from the Swedish threesome, here is a short explanatory video here. Similar to this video, in my case it was an "Evilginx" hack, except that the link was redirected to a stolen Microsoft O365 site, used in their cloud for other users to test, which is why I initially assumed that site as legitimate.


If I hadn't tested this software and had it almost ready to deploy, I probably wouldn't have learned, like "Janush" in the video, that my identity had been stolen. But as soon as the system evaluated it, it gradually guided me through pre-prepared procedures to save my "butt". The crucial thing was, as the software advised me, to immediately change the password for this account, which I did immediately. Anyway, the bad guy meantime has created a clone of me, almost indistinguishable from another real user, and after a short tug of war over access to the system, he finally gave up to attempt to use on my own account.


I had the feeling that I had won. I had my lost identity back after all! But they knew for sure that it was not true.

And so a foreign student appeared in Radio ГA / ГA. He had a good preparation from the "GRU" and "FSB" and learned quickly with us. Very soon he exceeded my knowledge, obtained only from the Google search web site. I know, I'm making it difficult again - "there was no money for your training, comrade", I thought aptly.


And so, with the help of another colleague of mine, I discovered and ignominiously blocked him on 26/11/2019. My American action hero #RC ("Remotely Controlled"), who supposedly discovered it hours earlier, didn't block the account and instead ran away from work to hide in the subway. Here he was waiting for me to do it. In his version of the investigative file, which I have never seen and which was then used in my deposition, he identified himself as the one who discovered the account. He discovered and did not act, that is what I told him in our last private conversation.


He laughed at me and with the confidence of a superman replied with an ironic smile - "no one will believe you anyway, I have all the evidence".

Now it actually occurs to me - why was the bad boy interested in his account right after the account of the highest in the food chain Radio ГA / ГA? Suspicious coincidence, don't you think?


Just like then, this time I didn't hide my emotions.


OMG! WTF?


For those 46 days, as the self-proclaimed IT specialists of Radio ГA / ГA #MV ("Dr. Prasátko") and #JH ("Dr. Hustá") emphasised in court, I allegedly let him do harm here and only changed password. Even #MV ("Mgr. Prasátko") had a flaming rant about the doorman, the key, and locking the entrance after inviting bad guy in! Simply, Jožka Urválek was "cowboy" compared to him.


Three letters that often say everything. They influence our being and non-being worldwide, they help us to express who is who and who belongs where in short and without long words. They changed my life, especially my professional life. But I didn't mess with any of those three letters and I still stayed on the right side.

But how long will my conviction last?


And anyway, which side is actually the right one?

 
 
 
  • Writer: RFERL Watch
    RFERL Watch
  • Apr 8, 2023
  • 7 min read

Updated: Apr 9, 2023


After this legendary speech of Major Terazky from the "Black Barons", I would like to continue in the next paragraph a little more seriously. I will return to the reasons for its usage at the end of this post.


So allow me to preface this post by apologising to all the certain inaccuracies and mainly incompleteness that I am about to publish here. At the same time, I would like to ask for leniency with all of you who are unpopular in this area, or do not speak the language of my tribe. I will try to compile from public sources and briefly explain the differences between the infrastructure and cloud solutions of the systems for which I was co-responsible at Radio ГA / ГA. Without stating these facts, I would not be able to proceed intelligibly further, and my further testimony would, as you surely understand, be somewhat "out of the mill".


ree

Since my entire working stay at Radio ГA / ГA revolved around software solutions in the field of electronic mail services, applications and their licensing, I will focus only on them. So for simplicity we can say that there are 2 licensing models and their deployments.


On-premise

On-premise solutions represent software (programs) or hardware (servers and computers) that are stored in the company's internal infrastructure and space. In the case of on-premise solutions, all maintenance, updates and security are managed by the company, or the company hires external specialists who provide server support.


Radio ГA / ГA and "on premise" time:

In 2004, I joined Radio ГA / ГA version 1.0 as a "Systems Support Specialist" with a long-term qualification from "business" for administration and development in the IBM Domino/Notes environment. I basically took care of a large information system based on this platform, consisting of several dozen servers and supporting almost 1500 users. It was a typical example of the infrastructure, operated on the premises of Radio ГА / ГA and all hardware and software management was taken care of by ourselves.


Cloud

Cloud represents an outsourced form of infrastructure. Companies providing cloud services (providers) own their own or rented data centres in which they rent individual servers to clients. The client pays a regular fee for a license that gives them access to the data store. This license is scalable and includes all server support. Access to the data storage works as a rule via the Internet: the client can manage his data and programs via a web browser on any device. There are several types of cloud services, but due to the incidents described later, I will focus on SaaS, or "software as a service", which is Microsoft Office365 and for which I was co-responsible.


Radio ГA / ГA and "cloud" time:


However, in 2012, with the transformation of the company to version 2.0, the company's management began to promote the Microsoft Office365 cloud solution, which is a typical representative of the SaaS category. Those from "the upper echelons of the local food chain", probably after undergoing a light lobotomy, argued how wonderful it would be for us to have all our data on the Internet - after all, it is a modern and secure system! Guess what, from the Bill Gates association itself!


And how did it work with this solution? All hardware and software management was handled by the provider, in our case Microsoft, and we rented an end service from them, i.e. an application or program, for which, of course, regular fees are paid according to different licensing models and whose goal is for the service provider to understandably make money. This is a typical model that works for thousands of companies.


And while I'm on the subject, during the "on premise" era, we paid for this information system a base annual license support rate of several tens of thousands of US bucks plus my annual admin salary. That was roughly the cost of an information system with mail and quantum of applications. In order to save on running servers, we preferred not to replace them, so by the end of my tenure here it was common for them to run without shutdown for more than 10 years - hats off to "HPs" servers!


After the transition to the new SaaS system, the real "financial porn" began. Licenses began to be paid according to a simple "cloud" formula - the unit price of the license multiple the number of people multiple 12 months. It is not necessary to state what "money pipes" flowed to the company from the Redmond Campus in the USA. With a little taste in searching public price lists and using a calculator, you will understand the reason why my supervisor #RC("Remotely controlled") preferred to block such kind of information for me in the administration portal - probably in order to heal my mental state.



In connection with this type of service, I always have to remember the "pearls" of opinion that, like one man, the defendant opponent poured out during each of our court "sessions". That I reacted insufficiently and that I should have disconnected the infrastructure, that they were told to do so by their local administrator. It's just a shame that they mostly didn't let us speak - I could have directed them to Saša Lukashenko. In this task, unlike me, he successfully hosted here .


If you look at the image below, we are only talking about one quarter of this four-leaf clover, about Email. And since the liquidation of the previous "on-premise" solution, including applications, was successfully started, and the word "IBM Domino/Notes" became obscene and was obligatorily replaced by the word "legacy" (obsolete) everywhere, it was necessary to order and pay soon also for the remaining "flower tickets" below.


By the way, I carried this label with me until my last days. As the lawyer of the opposing party #MV ("Mgr. Prasátko") did not forget to teach me about its uselessness in his closing speech - he says that today no one uses the system anyway and that everyone runs away from it as much as they can.

ree
But how to save?

Negotiations with the supplier were one thing, but "political" and according to the well-known "when the bird..." e.t.c. were other stories. The cheapest licensed model was bought and as my #RC ("Remotely controlled") supervisor often bragged - it was priced especially for us as the cheapest and specified that it was intended for "charity . It probably goes without saying that it wasn't exactly a "Mercedes". But I have to cut off all the bad guys here - because at least it was driving.


I tried to convince the duo of self-proclaimed IT specialists #MV ("Mgr. Prasátko") and #JH ("Dr. Hustá") in the courtroom, especially with the technical and "know-how" equipment of Radio ГA / ГA (which, unfortunately, I also counted on), it is not necessary to talk at further.


It was in this structure for several years, and sooner or later we were begging for trouble. Only after a significant security incident and my forced "fire", the details of which I will be happy to introduce you to in one of my next posts, the already educated American manager started buying, and in a hurry at the beginning of January 2020, new and more expensive and more secure license models.


But that was in price for other quality of "bananas"!

And because it was necessary to cover up this earlier managerial failure of his, no one spoke to him about it this time. As the Americans say - "justification is important", we would say - "the end justifies the means". Here is a very good article aptly titled Bosses are reluctant to spend money on cybersecurity. Then they are hacked. - as if written about Radio ГA / ГA.


Now you may be wondering why I am listing all of this here?


My job description describes the tasks and responsibilities associated with installing and managing servers and business applications, with responsibility for day-to-day systems maintenance, including troubleshooting, upgrades, server and network issues, user support, security, disaster recovery and data backup, including work on innovative projects for server system technologies.


In English and in the official document, I state this below.


ree

ree

All of you who carefully read the previous information about "on premise infrastructure" and its difference from the "cloud" one, after reading my job responsibilities ("Responsibilities" section) must have clearly come to a conclusion that they didn't cover to after more than 2 years, all these "anointed" - Judge #JH ("Dr. Hustá"), the Court of Appeal, #LA ("Leklá Andělka") and not even the lawyer #MV ("Mgr. Prasátko") paid by them.


Not only did I not have the job duties to work on a cloud SaaS system where a hacker attack occurred while testing other software, but the spicy thing is that I performed this function at Radio ГА / ГA without defining job duties and without proper training, which I kept demanding, like a broken gramophone, for more than 5 years.

They say there is no money for that, my superior always whispered in my ear in a mysterious voice when I asked for an explanation.


However, as I soon found out, I relied prematurely on the fact that it was not possible to grossly breach job duties that I did not have at all, as stated in the preamble to my statement below.


ree

When I pointed out this fact to the Court of Appeals on 3/29/2022, I thought I would kill them all after more than two years of dragging the courts with this simple argument. Me, an ordinary "IT guy" and a legal zero! Only with my sister!


I was wrong again, as I have been many times in this monster trial.

The only one who responded to this argument of ours was Radia ГA / ГA's external lawyer, #MV ("Mgr. Prasátko"), well paid by the American taxpayers, who "on the fly" changed the text of my above statement to a more appropriate - "for gross violation of work discipline”. The fact that this is a completely different quote from the statement, moreover, with a problem-free employee, without a hearing at the first instance court, did not bother the lady judge of the appeal court at all, and so after 15 minutes of the hearing, rushing to a well-deserved lunch, the judge confirmed the decision of her first instance colleague in a "robe" - #JH ("Dr. Hustá").


As the classic said (Mr. Švejk's story):


“Clear case Mr. Auditor, you are lucky, another execution. Congratulations. Bring in the convict, I mean the indicted, and briskly, the cook cursed me, that there would be kidneys at half past eleven. And they must, as is well known, be eaten warm.”

Holt, when completing point number 4 of the already mentioned template , there Radio ГA / ГA does not know a brother.


Discipline must be, so it is right!


Finally, one thought for all the more sensitive of you:


Do you believe me that the "violation of work duties", even if non-existent, would be nicer to me in the end?

 
 
 
bottom of page