Security Manager’s Journal: Did DLP tool prevent an assault? – Computerworld. The article discusses how a company practically uses DLP solutions to reduce the risk associated with traditional computer crimes. The interesting item here is the statement that likens the company’s limitation on privacy to the plain view doctrine in law enforcement.
Author Archive | Spencer
http://www.wired.com/threatlevel/2013/02/legal-basis-killing-americans/ From the article: The paper’s basic contention is that the government has the authority to carry out the extrajudicial killing of an American citizen if ‘an informed, high-level official’ deems him to present a ‘continuing’ threat to the country. This sweeping authority is said to exist even if the threat presented isn’t imminent in […]
Defend: The entity defends its networks by using appropriate prevention controls, technologies and techniques designed to render improbable or impossible an attack by a network assailant. The entity uses a layered defense-in-depth approach to assure that risks to its systems are defended, and that the basic tenets of information security are designed into the network’s […]
honeynet.org David Dittrich really lambasts a CSO article. He references EXCELLENT source material, including a chapter from 2005, chapter 182 in Vol III, Handbook of Information Security
http://www.packetknife.com/briefly-on-the-network-use-of-force-continuum Well written commentary. Looking forward to more debate.
Apple is designing Skeuomorphic applications to help people more intuitively grasp their operating environment. “Skeuomorphism, as it applies to computer software, is the use of ornamental design elements that represent familiar objects in the digital realm. The technique was first implemented by software designers to help ease users into the unfamiliar world of computing. For […]
Great article from the COPS Office at the US Department of Justice on the use of force. http://www.cops.usdoj.gov/default.asp?item=1374 Some good quotes from the article: The International Association of Chiefs of Police (IACP) in its study, Police Use of Force in America 2001, defined use of force as “The amount of effort required by police to […]
I keep hearing this term Active Defense. Its catchy, and it implies a level of activity associated with defense. But what is it, and is it a use of force? Brandon and I discussed this, and he pointed out that he believed active defense could be distinguished from passive defense, and that it would fall somewhere […]
On the Use of Force In physical security and law enforcement, there is a principle of an escalating scale of appropriate force that can be applied when an officer is defending himself, a property, or person. This use of force scale begins with officer presence, and quickly escalates to verbalization, then empty-hand control techniques, then […]
http://www.projectnova.org/faq/index.html I’m not endorsing this product, though I think they’ve got an innovative concept. Someone let me know how the product actually works. From the perspective of the Orlando Doctrine, however, the description of the application fits neatly into the Deceive spectrum on the Network Use of Force Continuum. It helps from a detection perspective […]