Profile

Cover photo
ISSA, Colorado Springs chapter
12 followers|2,795 views
AboutPostsPhotosVideos

Stream

 
 
An old friend, who helped point my direction in my early days of #InfoSec , once told me...
"You can trust me. But you shouldn't." -loopy

It is an important point and most people don't fully learn the lesson. It's basic human nature, to be helpful. It's why Social Engineering is and will continue to be so successful against most targets.

So I want to encourage you, each and every one of you, to foster a sense of ACCOUNTABILITY when interacting digitally (or IRL for that matter). I've heard people use phrases like "trust but verify" or "in God we trust; all others pay cash". These are the right kind of attitude despite sounding somewhat cynical.

We often can trust people; we rarely should do so implicitly.

Thanks to +Filip H.F. Slagter for the discussion that prompted me to share this directly.
1
Add a comment...

ISSA, Colorado Springs chapter has a new profile photo.

Shared publicly  - 
1
Add a comment...
Have them in circles
12 people
James Burton's profile photo
george aiken's profile photo
Al Cooper's profile photo
Serena Freeberg's profile photo
Jeff Pettorino's profile photo
 
Posted by the chapters Board-Member-At-Large +Jeff Pettorino.
 
A lot of folks are up in arms about this. I can understand why, but I caution everyone to consider the facts carefully, first. This is not a 5th Amendment issue, IMHO; it's all 4th Amendment. (5th is about Self-incrimination, 4th is about Search and Seizure, in regards to this case)
The court has issued a search warrant for the contents of laptop. Imagine it was a house, instead of a computer. The tenant/owner does not comply and refuses to give officials the key to enter the house. They are failing to support the lawful order of the court, and I believe that in itself might be "Contempt". If not, it certainly is a step down that path.
The fundamental difference in this case, is the physical ability of the officials to execute the search warrant without cooperation. With a house, they could kick the door in, pick the lock, break a window, etc. With the laptop, there is not much of a chance that they can access the storage without the cooperation of the owner.
This last point is the real crux of the issue. And that is where the 5th vs. 4th Amndmt. arguments start.
I don't have any answers; I simply find it fascinating and want to help everyone understand what is really at the crux of this case.
1
Add a comment...
1
Ralph Hoefelmeyer's profile photo
 
Can he increase the demand for and pay of security people in Colorado Springs or DTC? NOTE that Schriever is NOT included. They are a hardship post. Yes, that is my focus. We've got truckloads of members, so it's either a lot more great job creation or create cutting edge OSS apps we can support for the world.
Add a comment...
People
Have them in circles
12 people
James Burton's profile photo
george aiken's profile photo
Al Cooper's profile photo
Serena Freeberg's profile photo
Jeff Pettorino's profile photo
Contact Information
Contact info
Email
Story
Tagline
Colorado Springs chapter of the Information Security Systems Association
Links