Profile cover photo
Profile photo
ISSA, Colorado Springs chapter
15 followers -
Colorado Springs chapter of the Information Security Systems Association
Colorado Springs chapter of the Information Security Systems Association

15 followers
About
ISSA, Colorado Springs chapter's posts

Post has shared content
An old friend, who helped point my direction in my early days of #InfoSec , once told me...
"You can trust me. But you shouldn't." -loopy

It is an important point and most people don't fully learn the lesson. It's basic human nature, to be helpful. It's why Social Engineering is and will continue to be so successful against most targets.

So I want to encourage you, each and every one of you, to foster a sense of ACCOUNTABILITY when interacting digitally (or IRL for that matter). I've heard people use phrases like "trust but verify" or "in God we trust; all others pay cash". These are the right kind of attitude despite sounding somewhat cynical.

We often can trust people; we rarely should do so implicitly.

Thanks to +Filip H.F. Slagter for the discussion that prompted me to share this directly.

Post has shared content
Posted by the chapters Board-Member-At-Large +Jeff Pettorino.
A lot of folks are up in arms about this. I can understand why, but I caution everyone to consider the facts carefully, first. This is not a 5th Amendment issue, IMHO; it's all 4th Amendment. (5th is about Self-incrimination, 4th is about Search and Seizure, in regards to this case)
The court has issued a search warrant for the contents of laptop. Imagine it was a house, instead of a computer. The tenant/owner does not comply and refuses to give officials the key to enter the house. They are failing to support the lawful order of the court, and I believe that in itself might be "Contempt". If not, it certainly is a step down that path.
The fundamental difference in this case, is the physical ability of the officials to execute the search warrant without cooperation. With a house, they could kick the door in, pick the lock, break a window, etc. With the laptop, there is not much of a chance that they can access the storage without the cooperation of the owner.
This last point is the real crux of the issue. And that is where the 5th vs. 4th Amndmt. arguments start.
I don't have any answers; I simply find it fascinating and want to help everyone understand what is really at the crux of this case.

Post has attachment

Post has attachment
Shared originally by +Kyle Maxwell

Post has attachment
Photo
Wait while more posts are being loaded