jump to navigation

Armed Guards Kill Two Indian Fisherman- “…suspected to be pirates” February 21, 2012

Posted by Chris Mark in Industry News, Piracy & Maritime Security.
Tags: , , , , , , , , ,
2 comments

According to the Times of India, armed guard aboard an Italian merchant (Enrica Lexie) vessel shot and killed two Indian fisherman last night that they “…suspected to be pirates.”  According to the Italian government, the vessel did not respond to warning lights.  According to the Indian fisherman, no prior warning was given.  Here is where it gets somewhat questionable: “Two fishermen in a boat were killed after guards onboard the Italian merchant vessel fired at them off Alapuzha coast last evening, suspecting them to be pirates.”  While the facts are not yet public on what exactly happened, my personal view is that this particular episode is has serious issues. Based on other reports, the guards were members of the Italian navy and NOT private security. (more…)

“Trust but Verify”- Insider Threats & Intellectual Property Theft February 20, 2012

Posted by Chris Mark in InfoSec & Privacy, Risk & Risk Management.
Tags: , , , , , , , ,
add a comment

According to the US Government, intellectual property theft costs the US approximately $250 billion per year.  Unfortunately, a large and growing percentage of this theft is due to insiders.  The human element of data security is a topic that I have written on numerous times.  This article follows one I wrote in August, 2011 titled: Security 101: The Human Element.

I have worked with a number of large (and small) organizations that were very focused on risk management and information security.  It is always disheartening when you find that the companies focus solely upon external threats and ignore one of the largest threats to their intellectual property; their own employees.  Humans are social creatures.  We make friends and we want to be trusted.  We also believe in our fellow person.  Nobody likes to feel like they are not trusted and consequently, few like to make others feel like they are not trusted.  Unfortunately, where data security and the protection of intellectual property is concerned, companies are well advised to adhere to the old adage: “Trust but Verify”.

With increased responsibility often comes increased authority and increased access to sensitive systems, and information.  Companies often make the mistake of believing that with increased responsibility comes a decrease in the need to monitor activity.  (more…)

With Privacy the Sum May Be Greater than the Parts February 17, 2012

Posted by Chris Mark in InfoSec & Privacy, Risk & Risk Management.
Tags: , , , , ,
add a comment

Information Security can be described as the protection of data while privacy is defined as the appropriate use of data.  Volumes of data is collected on all of us every day.  Some of the data we voluntarily provide in exchange for additional benefits and services (airline mile programs, loyalty shopper programs, for example).  Other data we unknowingly provide such as shopping history. Regardless, we expect the custodians of the data to use it appropriately and maintain privacy.  Unfortunately, sometimes company’s pursuit of profits causes them to walk a very fine line as far as privacy is concerned.  The following is an example of where a company arguably violated the tenets of privacy while possibly not violating any laws.

According to a story reported recently, Target figured out a teenage girl was pregnant from her shopping history and inadvertently told her family.  The end result is that 1) Target knew (statistically they are right 90% of the time), and 2) Target, by sending pregnancy related coupons to the girl, informed her family that she was pregnant, without her knowledge or consent.  Here is how it happened. (more…)

Armed Guards- The end of the “Golden Age” of Somali Piracy? February 17, 2012

Posted by Chris Mark in Industry News, Piracy & Maritime Security, Risk & Risk Management.
Tags: , , , , , ,
add a comment

Debate over the use of armed guards has raged for several years as the those who advocate for the use of armed guards applaud their use and those who oppose their use argue that they are ineffective or exacerbate the problem.  Last year I wrote a whitepaper on how armed guards prevent hijackings.  (Deterrence Theory).   With 2012 we are finally are beginning to see objective data on the impact of armed guards.  David Rider’s article: “The Pirate Surge That Never Was” outlines some interesting facts that demonstrate that armed guards are the best line of defense for a ship in high risk waters. According to statistics in the article, October 2011 saw 26 attacks with only one successful hijacking.  Of the 26 attacks in October 2011, fully 16 of them were repelled by armed guards on the vessels.  November 2011 saw 11 attacks with 5 being repelled by armed guards.

When asked why pirate attacks are down in 2011, Robert Young Pelton, who publishes SomaliaReport.com states unequivocally: (more…)

Security, Exploits & Vulnerabilities- Security is Never 100% February 16, 2012

Posted by Chris Mark in InfoSec & Privacy, Risk & Risk Management.
Tags: , , , , , , , , ,
add a comment

In light of the recent disclosures of breaches of major security technologies and vendors, I felt compelled to write this post.  One of my favorite subjects to debate (and argue over) is security theory in general, and specifically the topics of vulnerabilities & exploits.  They are concepts that are critical in the fields of information security, risk management and other areas of security.  In truth, the concepts extend beyond IS but they are very common in the IS World and easier, in my opinion, to discuss in the context of IS.  So what are exploits & vulnerabilities and why are they important?

First, we need to understand that there is no “guaranteed security” and security can never be 100% as there are always vulnerabilities which can be exploited. We may not have identified them yet, but they do exist.   Given enough time, effort, and the right tools, any security control can be circumvented.  Security should be viewed as a function of time and effort. (this will be discussed below)  Second it is important to understand that the concepts of exploits and vulnerabilities are inextricably entwined and are mutually dependent. This is where the debate begins so first lets get a working definition of the terms. (more…)