Security 101: “You don’t have to out run a bear…just your friends” February 22, 2012
Posted by Chris Mark in InfoSec & Privacy, Piracy & Maritime Security, Risk & Risk Management, weapons and tactics.Tags: armed security, arms race, Chris Mark, cybersecurity, InfoSec, Piracy & Maritime Security, risk, risk management, security
add a comment
Yesterday MSNBC had a story that discussed the “arms race” between Somali pirates and shipping companies. The article discussed the increasing violence of the pirates. While this should come as no surprise to anyone, it is a single statement that caught my attention. “Greater use of private armed security guards on ships and a much tougher approach by international navies is beginning to work, some… say. (more…)
“Lipstick on a Pig”- Vetting Armed Security Part 3 February 21, 2012
Posted by Chris Mark in Piracy & Maritime Security, Risk & Risk Management.Tags: Anti Piracy, armed security, Chris Mark, Maritime Security, Piracy & Maritime Security, risk management, security, vetting security
2 comments
The recent event where Italian military personnel killed “suspected pirates” off the coast of India should provide an exclamation point to shipping companies on the need to carefully evaluate the armed security protecting their vessels. While military personnel were involved in this particular incident, it is simply a matter of time before private military contractors make the same mistake. This post is part 3 of a series of posts on vetting companies. You can read the previous posts here and here.
One of the tactics being employed by many companies within the maritime security arena, and especially those with little experience, is to promote the fact that they are “ICOC signatories” as evidence of their professionalism and expertise. While there is little debate that the ICOC is a step in the right direction toward gaining some form of control over a growing industry, the ICOC is NOT and should NOT be viewed as anything more than what it is. Using the ICOC as any basis of evaluation of a security company is both dangerous and short sighted. All companies should be signatories of the ICOC. That being said, the ICOC is not intended to be a governance document or standard. The purpose of the International Code of Conduct for Private Security Companies (ICOC PSC) is to: (more…)
“Trust but Verify”- Insider Threats & Intellectual Property Theft February 20, 2012
Posted by Chris Mark in InfoSec & Privacy, Risk & Risk Management.Tags: Chris Mark, corporate espionage, cybersecurity, InfoSec, insider theft, IP Theft, markconsultinggroup.com, operational security, security
add a comment
According to the US Government, intellectual property theft costs the US approximately $250 billion per year. Unfortunately, a large and growing percentage of this theft is due to insiders. The human element of data security is a topic that I have written on numerous times. This article follows one I wrote in August, 2011 titled: Security 101: The Human Element.
I have worked with a number of large (and small) organizations that were very focused on risk management and information security. It is always disheartening when you find that the companies focus solely upon external threats and ignore one of the largest threats to their intellectual property; their own employees. Humans are social creatures. We make friends and we want to be trusted. We also believe in our fellow person. Nobody likes to feel like they are not trusted and consequently, few like to make others feel like they are not trusted. Unfortunately, where data security and the protection of intellectual property is concerned, companies are well advised to adhere to the old adage: “Trust but Verify”.
With increased responsibility often comes increased authority and increased access to sensitive systems, and information. Companies often make the mistake of believing that with increased responsibility comes a decrease in the need to monitor activity. (more…)
With Privacy the Sum May Be Greater than the Parts February 17, 2012
Posted by Chris Mark in InfoSec & Privacy, Risk & Risk Management.Tags: Chris Mark, data protection, mark consulting group, markconsultinggroup.com, privacy, Target
add a comment
Information Security can be described as the protection of data while privacy is defined as the appropriate use of data. Volumes of data is collected on all of us every day. Some of the data we voluntarily provide in exchange for additional benefits and services (airline mile programs, loyalty shopper programs, for example). Other data we unknowingly provide such as shopping history. Regardless, we expect the custodians of the data to use it appropriately and maintain privacy. Unfortunately, sometimes company’s pursuit of profits causes them to walk a very fine line as far as privacy is concerned. The following is an example of where a company arguably violated the tenets of privacy while possibly not violating any laws.
According to a story reported recently, Target figured out a teenage girl was pregnant from her shopping history and inadvertently told her family. The end result is that 1) Target knew (statistically they are right 90% of the time), and 2) Target, by sending pregnancy related coupons to the girl, informed her family that she was pregnant, without her knowledge or consent. Here is how it happened. (more…)
Armed Guards- The end of the “Golden Age” of Somali Piracy? February 17, 2012
Posted by Chris Mark in Industry News, Piracy & Maritime Security, Risk & Risk Management.Tags: armed security, Chris Mark, Maritime Security, mark consulting group, markconsultinggroup.com, Piracy & Maritime Security, somali pirates
add a comment
Debate over the use of armed guards has raged for several years as the those who advocate for the use of armed guards applaud their use and those who oppose their use argue that they are ineffective or exacerbate the problem. Last year I wrote a whitepaper on how armed guards prevent hijackings. (Deterrence Theory). With 2012 we are finally are beginning to see objective data on the impact of armed guards. David Rider’s article: “The Pirate Surge That Never Was” outlines some interesting facts that demonstrate that armed guards are the best line of defense for a ship in high risk waters. According to statistics in the article, October 2011 saw 26 attacks with only one successful hijacking. Of the 26 attacks in October 2011, fully 16 of them were repelled by armed guards on the vessels. November 2011 saw 11 attacks with 5 being repelled by armed guards.
When asked why pirate attacks are down in 2011, Robert Young Pelton, who publishes SomaliaReport.com states unequivocally: (more…)