Profile

Cover photo
ISSA, Colorado Springs chapter
15 followers|34,546 views
AboutPostsPhotosVideos

Stream

 
 
An old friend, who helped point my direction in my early days of #InfoSec , once told me...
"You can trust me. But you shouldn't." -loopy

It is an important point and most people don't fully learn the lesson. It's basic human nature, to be helpful. It's why Social Engineering is and will continue to be so successful against most targets.

So I want to encourage you, each and every one of you, to foster a sense of ACCOUNTABILITY when interacting digitally (or IRL for that matter). I've heard people use phrases like "trust but verify" or "in God we trust; all others pay cash". These are the right kind of attitude despite sounding somewhat cynical.

We often can trust people; we rarely should do so implicitly.

Thanks to +Filip H.F. Slagter for the discussion that prompted me to share this directly.
1
Add a comment...
 
A Colorado woman ordered to decrypt her laptop so prosecutors may use the files against her in a criminal case might have forgotten the pass...
1
Add a comment...

ISSA, Colorado Springs chapter has a new profile photo.

Shared publicly  - 
1
Add a comment...
Have them in circles
15 people
Lazlo Arcadia's profile photo
Al Cooper's profile photo
DSoft Technology's profile photo
Greg Debalski's profile photo
CeliacKidsClub Host's profile photo
James Burton's profile photo
Jeff Pettorino's profile photo
Lancope's profile photo
george aiken's profile photo
 
Posted by the chapters Board-Member-At-Large +Jeff Pettorino.
 
A lot of folks are up in arms about this. I can understand why, but I caution everyone to consider the facts carefully, first. This is not a 5th Amendment issue, IMHO; it's all 4th Amendment. (5th is about Self-incrimination, 4th is about Search and Seizure, in regards to this case)
The court has issued a search warrant for the contents of laptop. Imagine it was a house, instead of a computer. The tenant/owner does not comply and refuses to give officials the key to enter the house. They are failing to support the lawful order of the court, and I believe that in itself might be "Contempt". If not, it certainly is a step down that path.
The fundamental difference in this case, is the physical ability of the officials to execute the search warrant without cooperation. With a house, they could kick the door in, pick the lock, break a window, etc. With the laptop, there is not much of a chance that they can access the storage without the cooperation of the owner.
This last point is the real crux of the issue. And that is where the 5th vs. 4th Amndmt. arguments start.
I don't have any answers; I simply find it fascinating and want to help everyone understand what is really at the crux of this case.
Colorado federal judge gives Ramona Fricosu until February 21 to decrypt her PGP Desktop-encrypted Toshiba laptop--or face the consequences. Read this blog post by Declan McCullagh on Privacy Inc..
1
Add a comment...
1
Ralph Hoefelmeyer's profile photo
 
Can he increase the demand for and pay of security people in Colorado Springs or DTC? NOTE that Schriever is NOT included. They are a hardship post. Yes, that is my focus. We've got truckloads of members, so it's either a lot more great job creation or create cutting edge OSS apps we can support for the world.
Add a comment...
People
Have them in circles
15 people
Lazlo Arcadia's profile photo
Al Cooper's profile photo
DSoft Technology's profile photo
Greg Debalski's profile photo
CeliacKidsClub Host's profile photo
James Burton's profile photo
Jeff Pettorino's profile photo
Lancope's profile photo
george aiken's profile photo
Contact Information
Contact info
Email
Story
Tagline
Colorado Springs chapter of the Information Security Systems Association
Links