Cover photo
ISSA, Colorado Springs chapter
15 followers|148,161 views


An old friend, who helped point my direction in my early days of #InfoSec , once told me...
"You can trust me. But you shouldn't." -loopy

It is an important point and most people don't fully learn the lesson. It's basic human nature, to be helpful. It's why Social Engineering is and will continue to be so successful against most targets.

So I want to encourage you, each and every one of you, to foster a sense of ACCOUNTABILITY when interacting digitally (or IRL for that matter). I've heard people use phrases like "trust but verify" or "in God we trust; all others pay cash". These are the right kind of attitude despite sounding somewhat cynical.

We often can trust people; we rarely should do so implicitly.

Thanks to +Filip H.F. Slagter for the discussion that prompted me to share this directly.
Add a comment...
A Colorado woman ordered to decrypt her laptop so prosecutors may use the files against her in a criminal case might have forgotten the pass...
Add a comment...

ISSA, Colorado Springs chapter has a new profile photo.

Shared publicly  - 
Add a comment...
Posted by the chapters Board-Member-At-Large +Jeff Pettorino.
A lot of folks are up in arms about this. I can understand why, but I caution everyone to consider the facts carefully, first. This is not a 5th Amendment issue, IMHO; it's all 4th Amendment. (5th is about Self-incrimination, 4th is about Search and Seizure, in regards to this case)
The court has issued a search warrant for the contents of laptop. Imagine it was a house, instead of a computer. The tenant/owner does not comply and refuses to give officials the key to enter the house. They are failing to support the lawful order of the court, and I believe that in itself might be "Contempt". If not, it certainly is a step down that path.
The fundamental difference in this case, is the physical ability of the officials to execute the search warrant without cooperation. With a house, they could kick the door in, pick the lock, break a window, etc. With the laptop, there is not much of a chance that they can access the storage without the cooperation of the owner.
This last point is the real crux of the issue. And that is where the 5th vs. 4th Amndmt. arguments start.
I don't have any answers; I simply find it fascinating and want to help everyone understand what is really at the crux of this case.
Colorado federal judge gives Ramona Fricosu until February 21 to decrypt her PGP Desktop-encrypted Toshiba laptop--or face the consequences. Read this blog post by Declan McCullagh on Privacy Inc..
Add a comment...
Ralph Hoefelmeyer's profile photo
Can he increase the demand for and pay of security people in Colorado Springs or DTC? NOTE that Schriever is NOT included. They are a hardship post. Yes, that is my focus. We've got truckloads of members, so it's either a lot more great job creation or create cutting edge OSS apps we can support for the world.
Add a comment...
Colorado Springs chapter of the Information Security Systems Association
Contact Information
Contact info