jump to navigation

Understanding Deterrence & Crime Prevention June 25, 2014

Posted by Chris Mark in Uncategorized.
Tags: , , , , , , ,
1 comment so far

punishmentThis following an excerpt from the 2012 research brief titled “Failed State of Security; A Rational Analysis of Deterrence Theory and Cybercrime.”  I was recently provided a blog post by an ‘expert’ in which the author was again blaming the victim of a data breach while chiding companies for believing that they should not expect law enforcement to be there when you need them.  The author misses a major purpose of the criminal justice system; Deterrence of criminal behavior.  I late 2013 a US Senator stood in front of a Target store and blamed Target for their data breach.  Interestingly, this senator did not state that the US should redouble efforts to deter cybercrime through more effective laws or more aggressive law enforcement actions.   Until the laws and criminal justice system can begin to deter such behavior, cybercrime will continue to plague data industries.  So what is deterrence?

An Overview of Deterrence Theory

Deterrence theory has applications in a variety of fields including military, and maritime security settings, foreign affairs, and in criminology, to name a few. While seemingly unrelated, when looked at closely, the similarities are apparent.  Each these fields involve human decisions and humans that have the ability to behave and act in a manner contrary to the wishes of the other party. It is the ‘human element’ that is being modified by deterrent strategies.

History of Deterrence Theory

The concept of deterrence is relatively easy to understand and likely extends to the earliest human activities in which one early human dissuaded another from stealing food by employing the threat of violence against the interloper.  Written examples of deterrence can be attributed as far back as the Peloponnesian War, when Thucydides wrote that there were many conflicts in which one army maneuvered in a manner that convinced the opponent that beginning or escalating a war would not be worth the risk.[1]  In the 4th Century BC, Sun Tzu wrote: “When opponents are unwilling to fight with you, it is because they think it is contrary to their interests, or because you have misled them in to thinking so.”[2]  While most people seem to instinctively understand the concept at the individual level, contemporary deterrence theory was brought to the forefront of political and military affairs during the Second World War with the deployment of nuclear weapons against Nagasaki and Hiroshima.[3]   (more…)

Norse- Live Cyber Threat Intelligence (very cool!) June 24, 2014

Posted by Chris Mark in Uncategorized.
Tags: , , , , , , ,
add a comment

I have been thinking about a topic on which to write.  I recently ran across this company called Norse and was impressed by the live cyber intelligence Norse provides.  Please checkout their website…as stated: “Every second, Norse collects and analyzes live threat intelligence from darknets in hundreds of locations in over 40 countries. The attacks shown are based on a small subset of live flows against the Norse honeypot infrastructure, representing actual worldwide cyber attacks by bad actors. At a glance, one can see which countries are aggressors or targets at the moment, using which type of attacks (services-ports). “…forgive the language but this is…badass!


New Security Reference Blog…The Security HOG June 13, 2014

Posted by Chris Mark in Uncategorized.
Tags: , , , , ,
add a comment

PiratePicGRISecurity HOG  is a complement to the GlobalRiskInfo site but is solely focused upon providing insight and education on the concepts of security, risk and compliance.  Having worked in numerous security domains for over 20 years has provided me with valuable insight into the concepts and underpinnings of the science and art of security.   Whether we are talking about physical security, operational security, information security or cybersecurity, the basic concepts remain the same.  This blog will focus on the more esoteric, yet important, concepts of proximate reality, deterrence & compellence, parallax and convergence, threats & vulnerabilities, risk, and more.

Some might wonder what, if any significance, HOG has to the discussion of security? Within the USMC a person who is not a Scout/Sniper is known as a Professionally Instructed Gunman or PIG while a trained Scout/Sniper is known as a Hunter of Gunman or HOG.  As a former Marine Corps Sniper I am a HOG and this is the reason the site is called Security HOG. Not too creative, I am afraid but it seemed to have a ring to it…

Snipers, Gun Control and Causality…oh my! June 11, 2014

Posted by Chris Mark in Uncategorized.
Tags: , , , , , , , , , , ,

causeWith yet another shooting in the news, the debate is again raging about gun control. I personally believe these are healthy debates but I am often frustrated by the seemingly illogical positions taken on both sides of the debate.  Last year I wrote a post titled “A Perspective on Killing from a Marine and His Rifle” in which I provide personal as well as third party information on what is required to create a ‘killer’.   Adding to this I am including information that should help people better understand causality and point to the ‘actual’ cause of an event in which a firearm is used.  This is taken from the research brief titled: “Failed State of Security II; Victim Blaming in CyberCrime

Understanding Causality

The simple term “cause” can be deceptively complex to understand and apply.  The application becomes much more difficult when applied to social issues and events where ambiguity, subjectivity, and moral and ethical aspects must be considered.  While the concept of cause and causality has been studied and debated by philosophers for millennia a commonly accepted definition is still not found.   It was Virgil who, in Georgics 2 in 490 said: “Felix qui potuit rerum cognoscere causas” or “blessed accomplishment theirs, who can track the causes of things”.[i]   The difficulty of defining the concept of “cause” is familiar to those with an interest in philosophy or science.  Without becoming a primer on the intricacies of the debate, suffice it to say that cause, like security, is necessarily contextual in nature.   Within the context of Victimology, it is important to understand the distinction between identifying what a person emotionally or philosophically believes is a ‘cause’ of an event that impacts a victim and the philosophical and legal concepts of ‘cause’ as they applies to a crime.

The Philosophical View of Causality

As discussed in the introduction to this paper, people often ascribe blame based upon their internal logical calculus or emotional belief as to what a ‘cause’ of an event is.  Within the context of firearm violence, this is particularly true.  Firearm control advocates state that “firearms cause” violence etc.  For this reason, it is important to understand the philosophical underpinnings of reasoning and how they apply to determining ‘cause’.  As important is the understanding of errors in logics. Within logic, errors in either reasoning or structure are known as fallacies.  With an understanding of the common fallacies that pertain to identification of cause, it is easier to understand and identify the true, or actual cause of an event. (more…)

(DESERTER/TRAITOR) Bowe Bergdahl “traded” by Taliban (UPDATED x2) May 31, 2014

Posted by Chris Mark in Uncategorized.
Tags: , , , , , , , , , , , , , , ,
add a comment

UPDATED..I have read numerous reports and claims and talked to numerous individuals.  Nothing pains me more than to write that one of our own is a deserter and traitor.  Out of respect for those who served with Bergdahl and, more importantly, those who DIED  searching for Bergdahl, I am updating this post.  I truly believe that Bergdahl left his post intentionally thereby deserting his post and intended to join the the enemy.   Unfortunately, 6 brave soldiers died searching for this traitor.   This post is now a tribute to those brave soldiers…..Rest Easy Brave Soldiers…rest easy…

  • Staff Sergeant Clayton Bowen,
  • Private 1st Class Morris Walker
  • Staff Sergeant Kurt Curtiss
  • 2nd Lieutenant Darryn Andrews
  • Staff Sergeant Michael Murphrey,
  •  Private 1st Class Matthew Martinek

The more information that comes out about Bergdahl, the more it appears (to me, anyhow) that he deserted and 5 (or more) soldiers were killed in the search for him.  5 Taliban commanders were traded for his release.  I am going to await further information before removing this post.  Until them, I am grateful an American soldier is home. Today marks a great day.  A Prisoner of War who was captured by the Taliban and held for 5 years has been released in exchange for 5 Taliban prisoners held at Gitmo.  You can read the story here.    Glad to have Sgt. Bergdahl coming back home!…


Get every new post delivered to your Inbox.

Join 230 other followers

%d bloggers like this: